Dec 13 15:55:19.932238 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:55:19.932282 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:55:19.932301 kernel: BIOS-provided physical RAM map: Dec 13 15:55:19.932312 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 15:55:19.932322 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 15:55:19.932332 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 15:55:19.932356 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 15:55:19.932367 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 15:55:19.932377 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 15:55:19.932387 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 15:55:19.932400 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 15:55:19.932411 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 15:55:19.932421 kernel: NX (Execute Disable) protection: active Dec 13 15:55:19.932431 kernel: SMBIOS 2.8 present. Dec 13 15:55:19.932444 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 15:55:19.932455 kernel: Hypervisor detected: KVM Dec 13 15:55:19.932481 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 15:55:19.932492 kernel: kvm-clock: cpu 0, msr 3219a001, primary cpu clock Dec 13 15:55:19.932504 kernel: kvm-clock: using sched offset of 4761789687 cycles Dec 13 15:55:19.932516 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 15:55:19.932527 kernel: tsc: Detected 2500.032 MHz processor Dec 13 15:55:19.932539 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:55:19.932551 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:55:19.932562 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 15:55:19.932573 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:55:19.932588 kernel: Using GB pages for direct mapping Dec 13 15:55:19.932600 kernel: ACPI: Early table checksum verification disabled Dec 13 15:55:19.932611 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 15:55:19.932622 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932634 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932645 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932739 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 15:55:19.932753 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932764 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932781 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932804 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:55:19.932816 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 15:55:19.932828 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 15:55:19.932839 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 15:55:19.932850 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 15:55:19.932868 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 15:55:19.932884 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 15:55:19.932896 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 15:55:19.932908 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 15:55:19.932920 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 15:55:19.932932 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 15:55:19.932944 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 15:55:19.932956 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 15:55:19.932971 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 15:55:19.932984 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 15:55:19.932996 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 15:55:19.933008 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 15:55:19.933019 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 15:55:19.933031 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 15:55:19.933043 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 15:55:19.933055 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 15:55:19.933075 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 15:55:19.933087 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 15:55:19.933103 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 15:55:19.933115 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 15:55:19.933127 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 15:55:19.933139 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 15:55:19.933151 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 15:55:19.933163 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 15:55:19.933176 kernel: Zone ranges: Dec 13 15:55:19.933188 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:55:19.933201 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 15:55:19.933217 kernel: Normal empty Dec 13 15:55:19.933229 kernel: Movable zone start for each node Dec 13 15:55:19.933241 kernel: Early memory node ranges Dec 13 15:55:19.933253 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 15:55:19.933265 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 15:55:19.933277 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 15:55:19.933289 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:55:19.933301 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 15:55:19.933313 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 15:55:19.933334 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 15:55:19.933346 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 15:55:19.933358 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 15:55:19.933370 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:55:19.933382 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 15:55:19.933394 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:55:19.933406 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 15:55:19.933430 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 15:55:19.933442 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:55:19.933457 kernel: TSC deadline timer available Dec 13 15:55:19.933469 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 15:55:19.933481 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 15:55:19.933505 kernel: Booting paravirtualized kernel on KVM Dec 13 15:55:19.933517 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:55:19.933530 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:55:19.933542 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:55:19.933554 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:55:19.933566 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:55:19.933581 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 15:55:19.933593 kernel: kvm-guest: PV spinlocks enabled Dec 13 15:55:19.933605 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 15:55:19.933618 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 15:55:19.933629 kernel: Policy zone: DMA32 Dec 13 15:55:19.933643 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:55:19.933666 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:55:19.933680 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:55:19.933696 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 15:55:19.933708 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:55:19.933721 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 15:55:19.933733 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:55:19.933745 kernel: Kernel/User page tables isolation: enabled Dec 13 15:55:19.933757 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:55:19.933769 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:55:19.933781 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:55:19.933804 kernel: rcu: RCU event tracing is enabled. Dec 13 15:55:19.933822 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:55:19.933834 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:55:19.933846 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:55:19.933858 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:55:19.933871 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:55:19.933882 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 15:55:19.933895 kernel: random: crng init done Dec 13 15:55:19.933917 kernel: Console: colour VGA+ 80x25 Dec 13 15:55:19.933930 kernel: printk: console [tty0] enabled Dec 13 15:55:19.933943 kernel: printk: console [ttyS0] enabled Dec 13 15:55:19.933955 kernel: ACPI: Core revision 20210730 Dec 13 15:55:19.933968 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:55:19.933984 kernel: x2apic enabled Dec 13 15:55:19.933997 kernel: Switched APIC routing to physical x2apic. Dec 13 15:55:19.934009 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240957bf147, max_idle_ns: 440795216753 ns Dec 13 15:55:19.934022 kernel: Calibrating delay loop (skipped) preset value.. 5000.06 BogoMIPS (lpj=2500032) Dec 13 15:55:19.934035 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 15:55:19.934052 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 15:55:19.934064 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 15:55:19.934077 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:55:19.934089 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 15:55:19.934102 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:55:19.934114 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 15:55:19.934127 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 13 15:55:19.934140 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:55:19.934153 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:55:19.934165 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 15:55:19.934178 kernel: MMIO Stale Data: Unknown: No mitigations Dec 13 15:55:19.934194 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 15:55:19.934206 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:55:19.934219 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:55:19.934232 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:55:19.934244 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:55:19.934257 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 15:55:19.934269 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:55:19.934282 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:55:19.934294 kernel: LSM: Security Framework initializing Dec 13 15:55:19.934307 kernel: SELinux: Initializing. Dec 13 15:55:19.934320 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:55:19.934348 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:55:19.934360 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Dec 13 15:55:19.934372 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Dec 13 15:55:19.934385 kernel: signal: max sigframe size: 1776 Dec 13 15:55:19.934397 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:55:19.934409 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 15:55:19.934421 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:55:19.934433 kernel: x86: Booting SMP configuration: Dec 13 15:55:19.934446 kernel: .... node #0, CPUs: #1 Dec 13 15:55:19.934461 kernel: kvm-clock: cpu 1, msr 3219a041, secondary cpu clock Dec 13 15:55:19.934474 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 15:55:19.934486 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 15:55:19.934498 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 15:55:19.934524 kernel: smpboot: Max logical packages: 16 Dec 13 15:55:19.934536 kernel: smpboot: Total of 2 processors activated (10000.12 BogoMIPS) Dec 13 15:55:19.934549 kernel: devtmpfs: initialized Dec 13 15:55:19.934562 kernel: x86/mm: Memory block size: 128MB Dec 13 15:55:19.934574 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:55:19.934587 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:55:19.934603 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:55:19.934616 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:55:19.934629 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:55:19.934642 kernel: audit: type=2000 audit(1734105318.860:1): state=initialized audit_enabled=0 res=1 Dec 13 15:55:19.934663 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:55:19.934677 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:55:19.934690 kernel: cpuidle: using governor menu Dec 13 15:55:19.934703 kernel: ACPI: bus type PCI registered Dec 13 15:55:19.934716 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:55:19.934733 kernel: dca service started, version 1.12.1 Dec 13 15:55:19.934746 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 15:55:19.934758 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 15:55:19.934771 kernel: PCI: Using configuration type 1 for base access Dec 13 15:55:19.934784 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:55:19.934807 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:55:19.934821 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:55:19.934834 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:55:19.934850 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:55:19.934863 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:55:19.934876 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:55:19.934888 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:55:19.934901 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:55:19.934914 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:55:19.934926 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 15:55:19.934939 kernel: ACPI: Interpreter enabled Dec 13 15:55:19.934952 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:55:19.934964 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:55:19.934981 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:55:19.934993 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 15:55:19.935006 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 15:55:19.935263 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:55:19.935433 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 15:55:19.935598 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 15:55:19.935617 kernel: PCI host bridge to bus 0000:00 Dec 13 15:55:19.935829 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:55:19.935975 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:55:19.936126 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:55:19.936289 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 15:55:19.936431 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 15:55:19.936609 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:55:19.936772 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 15:55:19.937000 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 15:55:19.937184 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 15:55:19.937344 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 15:55:19.937507 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 15:55:19.942936 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 15:55:19.943113 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:55:19.943319 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.943502 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 15:55:19.943712 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.943902 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 15:55:19.944080 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.944239 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 15:55:19.944431 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.944598 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 15:55:19.944846 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.945006 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 15:55:19.945183 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.945339 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 15:55:19.945539 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.945723 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 15:55:19.945935 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 15:55:19.946093 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 15:55:19.946283 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 15:55:19.946439 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 15:55:19.946593 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 15:55:19.946808 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 15:55:19.946966 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 15:55:19.947155 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 15:55:19.947321 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 15:55:19.947476 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 15:55:19.947643 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 15:55:19.947849 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 15:55:19.948013 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 15:55:19.948194 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 15:55:19.948362 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 15:55:19.948526 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 15:55:19.957837 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 15:55:19.958012 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 15:55:19.958217 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 15:55:19.958389 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 15:55:19.958581 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:55:19.958766 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:55:19.958939 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:55:19.959147 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 15:55:19.959344 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 15:55:19.959540 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 15:55:19.959736 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:55:19.959914 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:55:19.960104 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 15:55:19.960268 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 15:55:19.960423 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:55:19.960586 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:55:19.960757 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:55:19.960957 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 15:55:19.961123 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 15:55:19.961283 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:55:19.961439 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:55:19.961596 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:55:19.961771 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:55:19.961955 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:55:19.962110 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:55:19.962268 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:55:19.962422 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:55:19.962577 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:55:19.962757 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:55:19.962931 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:55:19.963086 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:55:19.963249 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:55:19.963406 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:55:19.963572 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:55:19.963765 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:55:19.963961 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:55:19.964141 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:55:19.964162 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 15:55:19.964175 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 15:55:19.964195 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 15:55:19.964208 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 15:55:19.964221 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 15:55:19.964243 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 15:55:19.964256 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 15:55:19.964269 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 15:55:19.964282 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 15:55:19.964294 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 15:55:19.964307 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 15:55:19.964325 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 15:55:19.964338 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 15:55:19.964351 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 15:55:19.964372 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 15:55:19.964385 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 15:55:19.964398 kernel: iommu: Default domain type: Translated Dec 13 15:55:19.964411 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:55:19.964579 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 15:55:19.969157 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:55:19.969350 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 15:55:19.969371 kernel: vgaarb: loaded Dec 13 15:55:19.969386 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:55:19.969399 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:55:19.969413 kernel: PTP clock support registered Dec 13 15:55:19.969426 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:55:19.969439 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:55:19.969452 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 15:55:19.969471 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 15:55:19.969485 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 15:55:19.969500 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:55:19.969513 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:55:19.969527 kernel: pnp: PnP ACPI init Dec 13 15:55:19.969761 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 15:55:19.969784 kernel: pnp: PnP ACPI: found 5 devices Dec 13 15:55:19.969818 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:55:19.969838 kernel: NET: Registered PF_INET protocol family Dec 13 15:55:19.969851 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 15:55:19.969865 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 15:55:19.969878 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:55:19.969891 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 15:55:19.969904 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:55:19.969917 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 15:55:19.969930 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:55:19.969943 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:55:19.969960 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:55:19.969973 kernel: NET: Registered PF_XDP protocol family Dec 13 15:55:19.970134 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 15:55:19.970293 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 15:55:19.970450 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 15:55:19.970612 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 15:55:19.974845 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 15:55:19.975031 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 15:55:19.975192 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 15:55:19.975352 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 15:55:19.975510 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 15:55:19.975682 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 15:55:19.975853 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 15:55:19.976016 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 15:55:19.976171 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 15:55:19.976327 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 15:55:19.976482 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 15:55:19.976656 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 15:55:19.976837 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:55:19.977000 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:55:19.977153 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:55:19.977306 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 15:55:19.977468 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:55:19.977652 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:55:19.977850 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:55:19.978007 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 15:55:19.978161 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:55:19.978316 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:55:19.978471 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:55:19.978627 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 15:55:19.978819 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:55:19.978978 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:55:19.979134 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:55:19.979291 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 15:55:19.979446 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:55:19.979599 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:55:19.979769 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:55:19.979946 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 15:55:19.980104 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:55:19.980264 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:55:19.980421 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:55:19.980578 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 15:55:19.980748 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:55:19.980915 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:55:19.981071 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:55:19.981238 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 15:55:19.981395 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:55:19.981574 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:55:19.990898 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:55:19.991069 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 15:55:19.991235 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:55:19.991392 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:55:19.991543 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:55:19.991702 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:55:19.991860 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:55:19.992003 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 15:55:19.992142 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 15:55:19.992283 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:55:19.992463 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 15:55:19.992616 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 15:55:19.992846 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:55:19.993010 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 15:55:19.993202 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 15:55:19.993352 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 15:55:19.993501 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:55:19.993688 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 15:55:19.993855 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 15:55:19.994006 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:55:19.994175 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 15:55:19.994339 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 15:55:19.994495 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:55:19.994706 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 15:55:19.994880 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 15:55:19.995029 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:55:19.995185 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 15:55:19.995356 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 15:55:19.995512 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:55:19.995718 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 15:55:19.995901 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 15:55:19.996051 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:55:19.996239 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 15:55:19.996400 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 15:55:19.996555 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:55:19.996574 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 15:55:19.996600 kernel: PCI: CLS 0 bytes, default 64 Dec 13 15:55:19.996614 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:55:19.996633 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 15:55:19.996659 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 15:55:19.996673 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240957bf147, max_idle_ns: 440795216753 ns Dec 13 15:55:20.000649 kernel: Initialise system trusted keyrings Dec 13 15:55:20.000666 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 15:55:20.000681 kernel: Key type asymmetric registered Dec 13 15:55:20.000694 kernel: Asymmetric key parser 'x509' registered Dec 13 15:55:20.000707 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:55:20.000721 kernel: io scheduler mq-deadline registered Dec 13 15:55:20.000741 kernel: io scheduler kyber registered Dec 13 15:55:20.000755 kernel: io scheduler bfq registered Dec 13 15:55:20.000936 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 15:55:20.001098 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 15:55:20.001255 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.001413 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 15:55:20.001590 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 15:55:20.001768 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.001940 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 15:55:20.002097 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 15:55:20.002252 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.002408 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 15:55:20.002574 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 15:55:20.002744 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.002925 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 15:55:20.003080 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 15:55:20.003235 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.003397 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 15:55:20.003565 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 15:55:20.003759 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.003930 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 15:55:20.004088 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 15:55:20.004242 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.004410 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 15:55:20.004578 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 15:55:20.004765 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:55:20.004797 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:55:20.004814 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 15:55:20.004828 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 15:55:20.004842 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:55:20.004855 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:55:20.004869 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 15:55:20.004883 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 15:55:20.004903 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 15:55:20.005084 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 15:55:20.005106 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 15:55:20.005263 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 15:55:20.005424 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T15:55:19 UTC (1734105319) Dec 13 15:55:20.005589 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 15:55:20.005609 kernel: intel_pstate: CPU model not supported Dec 13 15:55:20.005655 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:55:20.005671 kernel: Segment Routing with IPv6 Dec 13 15:55:20.005684 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:55:20.005696 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:55:20.005722 kernel: Key type dns_resolver registered Dec 13 15:55:20.005735 kernel: IPI shorthand broadcast: enabled Dec 13 15:55:20.005748 kernel: sched_clock: Marking stable (965601891, 223161877)->(1467023846, -278260078) Dec 13 15:55:20.005762 kernel: registered taskstats version 1 Dec 13 15:55:20.005797 kernel: Loading compiled-in X.509 certificates Dec 13 15:55:20.005813 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:55:20.005833 kernel: Key type .fscrypt registered Dec 13 15:55:20.005846 kernel: Key type fscrypt-provisioning registered Dec 13 15:55:20.005860 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 15:55:20.005873 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:55:20.005887 kernel: ima: No architecture policies found Dec 13 15:55:20.005900 kernel: clk: Disabling unused clocks Dec 13 15:55:20.005914 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:55:20.005928 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:55:20.005946 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:55:20.005960 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:55:20.005973 kernel: Run /init as init process Dec 13 15:55:20.005987 kernel: with arguments: Dec 13 15:55:20.006000 kernel: /init Dec 13 15:55:20.006013 kernel: with environment: Dec 13 15:55:20.006026 kernel: HOME=/ Dec 13 15:55:20.006039 kernel: TERM=linux Dec 13 15:55:20.006052 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:55:20.006076 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:55:20.006100 systemd[1]: Detected virtualization kvm. Dec 13 15:55:20.006115 systemd[1]: Detected architecture x86-64. Dec 13 15:55:20.006128 systemd[1]: Running in initrd. Dec 13 15:55:20.006142 systemd[1]: No hostname configured, using default hostname. Dec 13 15:55:20.006156 systemd[1]: Hostname set to . Dec 13 15:55:20.006171 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:55:20.006189 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:55:20.006204 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:55:20.006218 systemd[1]: Reached target cryptsetup.target. Dec 13 15:55:20.006233 systemd[1]: Reached target paths.target. Dec 13 15:55:20.006247 systemd[1]: Reached target slices.target. Dec 13 15:55:20.006265 systemd[1]: Reached target swap.target. Dec 13 15:55:20.006279 systemd[1]: Reached target timers.target. Dec 13 15:55:20.006294 systemd[1]: Listening on iscsid.socket. Dec 13 15:55:20.006313 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:55:20.006327 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:55:20.006346 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:55:20.006360 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:55:20.006375 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:55:20.006389 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:55:20.006404 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:55:20.006418 systemd[1]: Reached target sockets.target. Dec 13 15:55:20.006432 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:55:20.006451 systemd[1]: Finished network-cleanup.service. Dec 13 15:55:20.006466 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:55:20.006480 systemd[1]: Starting systemd-journald.service... Dec 13 15:55:20.006495 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:55:20.006509 systemd[1]: Starting systemd-resolved.service... Dec 13 15:55:20.006524 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:55:20.006538 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:55:20.006553 kernel: audit: type=1130 audit(1734105319.932:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.006567 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:55:20.006601 systemd-journald[201]: Journal started Dec 13 15:55:20.006686 systemd-journald[201]: Runtime Journal (/run/log/journal/4c87367572e2446ba427fe2624657fe3) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:55:19.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:19.937696 systemd-modules-load[202]: Inserted module 'overlay' Dec 13 15:55:20.036870 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:55:20.036910 kernel: Bridge firewalling registered Dec 13 15:55:19.987131 systemd-resolved[203]: Positive Trust Anchors: Dec 13 15:55:20.044246 systemd[1]: Started systemd-resolved.service. Dec 13 15:55:20.044274 kernel: audit: type=1130 audit(1734105320.036:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:19.987155 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:55:20.052917 systemd[1]: Started systemd-journald.service. Dec 13 15:55:20.052946 kernel: audit: type=1130 audit(1734105320.044:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.052976 kernel: SCSI subsystem initialized Dec 13 15:55:20.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:19.987204 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:55:20.072441 kernel: audit: type=1130 audit(1734105320.052:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.072490 kernel: audit: type=1130 audit(1734105320.060:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.072523 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:55:20.072542 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:55:20.072560 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:55:20.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:19.997437 systemd-resolved[203]: Defaulting to hostname 'linux'. Dec 13 15:55:20.015559 systemd-modules-load[202]: Inserted module 'br_netfilter' Dec 13 15:55:20.053899 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:55:20.061515 systemd[1]: Reached target nss-lookup.target. Dec 13 15:55:20.068127 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:55:20.076372 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:55:20.088513 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:55:20.095153 kernel: audit: type=1130 audit(1734105320.089:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.088910 systemd-modules-load[202]: Inserted module 'dm_multipath' Dec 13 15:55:20.107404 kernel: audit: type=1130 audit(1734105320.095:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.089998 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:55:20.096680 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:55:20.109401 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:55:20.116881 kernel: audit: type=1130 audit(1734105320.110:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.112755 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:55:20.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.118955 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:55:20.138792 kernel: audit: type=1130 audit(1734105320.116:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.138829 dracut-cmdline[224]: dracut-dracut-053 Dec 13 15:55:20.142847 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:55:20.234710 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:55:20.256669 kernel: iscsi: registered transport (tcp) Dec 13 15:55:20.287568 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:55:20.287700 kernel: QLogic iSCSI HBA Driver Dec 13 15:55:20.336798 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:55:20.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.338798 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:55:20.398678 kernel: raid6: sse2x4 gen() 13464 MB/s Dec 13 15:55:20.416691 kernel: raid6: sse2x4 xor() 7836 MB/s Dec 13 15:55:20.434667 kernel: raid6: sse2x2 gen() 9364 MB/s Dec 13 15:55:20.452719 kernel: raid6: sse2x2 xor() 7705 MB/s Dec 13 15:55:20.470695 kernel: raid6: sse2x1 gen() 9670 MB/s Dec 13 15:55:20.489463 kernel: raid6: sse2x1 xor() 7023 MB/s Dec 13 15:55:20.489504 kernel: raid6: using algorithm sse2x4 gen() 13464 MB/s Dec 13 15:55:20.489524 kernel: raid6: .... xor() 7836 MB/s, rmw enabled Dec 13 15:55:20.490806 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 15:55:20.507667 kernel: xor: automatically using best checksumming function avx Dec 13 15:55:20.625701 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:55:20.638507 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:55:20.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.639000 audit: BPF prog-id=7 op=LOAD Dec 13 15:55:20.639000 audit: BPF prog-id=8 op=LOAD Dec 13 15:55:20.640439 systemd[1]: Starting systemd-udevd.service... Dec 13 15:55:20.657992 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 15:55:20.666737 systemd[1]: Started systemd-udevd.service. Dec 13 15:55:20.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.668623 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:55:20.687470 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 15:55:20.729041 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:55:20.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.730837 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:55:20.823607 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:55:20.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:20.912672 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 15:55:20.974972 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:55:20.975004 kernel: AVX version of gcm_enc/dec engaged. Dec 13 15:55:20.975023 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:55:20.975041 kernel: GPT:17805311 != 125829119 Dec 13 15:55:20.975071 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:55:20.975089 kernel: GPT:17805311 != 125829119 Dec 13 15:55:20.975106 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:55:20.975123 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:55:20.976671 kernel: AES CTR mode by8 optimization enabled Dec 13 15:55:20.996673 kernel: ACPI: bus type USB registered Dec 13 15:55:21.000659 kernel: usbcore: registered new interface driver usbfs Dec 13 15:55:21.000699 kernel: usbcore: registered new interface driver hub Dec 13 15:55:21.000719 kernel: usbcore: registered new device driver usb Dec 13 15:55:21.008668 kernel: libata version 3.00 loaded. Dec 13 15:55:21.015147 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:55:21.119389 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (448) Dec 13 15:55:21.119448 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 15:55:21.119816 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 15:55:21.119841 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 15:55:21.120021 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 15:55:21.120245 kernel: scsi host0: ahci Dec 13 15:55:21.120482 kernel: scsi host1: ahci Dec 13 15:55:21.120709 kernel: scsi host2: ahci Dec 13 15:55:21.120922 kernel: scsi host3: ahci Dec 13 15:55:21.121117 kernel: scsi host4: ahci Dec 13 15:55:21.121311 kernel: scsi host5: ahci Dec 13 15:55:21.121519 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Dec 13 15:55:21.121541 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Dec 13 15:55:21.121558 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Dec 13 15:55:21.121576 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Dec 13 15:55:21.121593 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Dec 13 15:55:21.121610 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Dec 13 15:55:21.126309 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:55:21.127095 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:55:21.133387 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:55:21.142641 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:55:21.144805 systemd[1]: Starting disk-uuid.service... Dec 13 15:55:21.151689 disk-uuid[528]: Primary Header is updated. Dec 13 15:55:21.151689 disk-uuid[528]: Secondary Entries is updated. Dec 13 15:55:21.151689 disk-uuid[528]: Secondary Header is updated. Dec 13 15:55:21.155658 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:55:21.161654 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:55:21.373677 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.383155 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.383238 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.383654 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.386693 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.393667 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:55:21.402842 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:55:21.422062 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 15:55:21.422273 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 15:55:21.422450 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:55:21.422650 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 15:55:21.422857 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 15:55:21.423032 kernel: hub 1-0:1.0: USB hub found Dec 13 15:55:21.423249 kernel: hub 1-0:1.0: 4 ports detected Dec 13 15:55:21.423446 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 15:55:21.423663 kernel: hub 2-0:1.0: USB hub found Dec 13 15:55:21.423884 kernel: hub 2-0:1.0: 4 ports detected Dec 13 15:55:21.657705 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 15:55:21.799711 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:55:21.806900 kernel: usbcore: registered new interface driver usbhid Dec 13 15:55:21.806959 kernel: usbhid: USB HID core driver Dec 13 15:55:21.816139 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Dec 13 15:55:21.816179 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 15:55:22.167693 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:55:22.168161 disk-uuid[529]: The operation has completed successfully. Dec 13 15:55:22.223736 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:55:22.224839 systemd[1]: Finished disk-uuid.service. Dec 13 15:55:22.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.231331 systemd[1]: Starting verity-setup.service... Dec 13 15:55:22.249658 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Dec 13 15:55:22.306066 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:55:22.308468 systemd[1]: Finished verity-setup.service. Dec 13 15:55:22.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.310368 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:55:22.404759 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:55:22.405863 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:55:22.407448 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:55:22.409558 systemd[1]: Starting ignition-setup.service... Dec 13 15:55:22.412081 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:55:22.428473 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:55:22.428528 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:55:22.428556 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:55:22.443200 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 15:55:22.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.450781 systemd[1]: Finished ignition-setup.service. Dec 13 15:55:22.452484 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:55:22.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.549157 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:55:22.552000 audit: BPF prog-id=9 op=LOAD Dec 13 15:55:22.554398 systemd[1]: Starting systemd-networkd.service... Dec 13 15:55:22.602117 systemd-networkd[709]: lo: Link UP Dec 13 15:55:22.602134 systemd-networkd[709]: lo: Gained carrier Dec 13 15:55:22.603667 systemd-networkd[709]: Enumeration completed Dec 13 15:55:22.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.604434 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:55:22.604532 systemd[1]: Started systemd-networkd.service. Dec 13 15:55:22.605993 systemd[1]: Reached target network.target. Dec 13 15:55:22.609056 systemd-networkd[709]: eth0: Link UP Dec 13 15:55:22.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.609064 systemd-networkd[709]: eth0: Gained carrier Dec 13 15:55:22.611121 systemd[1]: Starting iscsiuio.service... Dec 13 15:55:22.626365 systemd[1]: Started iscsiuio.service. Dec 13 15:55:22.636321 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:55:22.636321 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:55:22.636321 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:55:22.636321 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:55:22.636321 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:55:22.636321 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:55:22.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.628955 systemd[1]: Starting iscsid.service... Dec 13 15:55:22.637915 systemd[1]: Started iscsid.service. Dec 13 15:55:22.642393 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:55:22.648820 systemd-networkd[709]: eth0: DHCPv4 address 10.230.29.154/30, gateway 10.230.29.153 acquired from 10.230.29.153 Dec 13 15:55:22.663291 ignition[637]: Ignition 2.14.0 Dec 13 15:55:22.663320 ignition[637]: Stage: fetch-offline Dec 13 15:55:22.663461 ignition[637]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:22.663519 ignition[637]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:22.665457 ignition[637]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:22.665672 ignition[637]: parsed url from cmdline: "" Dec 13 15:55:22.665680 ignition[637]: no config URL provided Dec 13 15:55:22.665690 ignition[637]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:55:22.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.667692 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:55:22.665721 ignition[637]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:55:22.670025 systemd[1]: Starting ignition-fetch.service... Dec 13 15:55:22.665732 ignition[637]: failed to fetch config: resource requires networking Dec 13 15:55:22.666360 ignition[637]: Ignition finished successfully Dec 13 15:55:22.678744 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:55:22.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.679738 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:55:22.680940 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:55:22.682272 systemd[1]: Reached target remote-fs.target. Dec 13 15:55:22.684950 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:55:22.688939 ignition[723]: Ignition 2.14.0 Dec 13 15:55:22.688950 ignition[723]: Stage: fetch Dec 13 15:55:22.689130 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:22.689184 ignition[723]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:22.690809 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:22.690984 ignition[723]: parsed url from cmdline: "" Dec 13 15:55:22.690991 ignition[723]: no config URL provided Dec 13 15:55:22.691002 ignition[723]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:55:22.691018 ignition[723]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:55:22.695882 ignition[723]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 15:55:22.695910 ignition[723]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 15:55:22.701159 ignition[723]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 15:55:22.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.706839 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:55:22.720168 ignition[723]: GET result: OK Dec 13 15:55:22.720715 ignition[723]: parsing config with SHA512: 881d9a409752e8ad656f721192e9aeb85fb5c6da74547a56a17b75e5474c5a34d64d58ffcc1f47c99c7c5138e33330a8d22c4e8455eae2cca9f00e112314faf7 Dec 13 15:55:22.730970 unknown[723]: fetched base config from "system" Dec 13 15:55:22.732003 unknown[723]: fetched base config from "system" Dec 13 15:55:22.732803 unknown[723]: fetched user config from "openstack" Dec 13 15:55:22.734210 ignition[723]: fetch: fetch complete Dec 13 15:55:22.735030 ignition[723]: fetch: fetch passed Dec 13 15:55:22.735849 ignition[723]: Ignition finished successfully Dec 13 15:55:22.738610 systemd[1]: Finished ignition-fetch.service. Dec 13 15:55:22.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.740860 systemd[1]: Starting ignition-kargs.service... Dec 13 15:55:22.755464 ignition[734]: Ignition 2.14.0 Dec 13 15:55:22.755485 ignition[734]: Stage: kargs Dec 13 15:55:22.755657 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:22.755693 ignition[734]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:22.757413 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:22.758920 ignition[734]: kargs: kargs passed Dec 13 15:55:22.758989 ignition[734]: Ignition finished successfully Dec 13 15:55:22.760156 systemd[1]: Finished ignition-kargs.service. Dec 13 15:55:22.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.762576 systemd[1]: Starting ignition-disks.service... Dec 13 15:55:22.771982 ignition[740]: Ignition 2.14.0 Dec 13 15:55:22.772004 ignition[740]: Stage: disks Dec 13 15:55:22.772145 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:22.772179 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:22.773152 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:22.774537 ignition[740]: disks: disks passed Dec 13 15:55:22.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.776112 systemd[1]: Finished ignition-disks.service. Dec 13 15:55:22.774596 ignition[740]: Ignition finished successfully Dec 13 15:55:22.777529 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:55:22.778782 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:55:22.780524 systemd[1]: Reached target local-fs.target. Dec 13 15:55:22.781861 systemd[1]: Reached target sysinit.target. Dec 13 15:55:22.783059 systemd[1]: Reached target basic.target. Dec 13 15:55:22.785454 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:55:22.804758 systemd-fsck[747]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 15:55:22.811943 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:55:22.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.813728 systemd[1]: Mounting sysroot.mount... Dec 13 15:55:22.824664 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:55:22.825423 systemd[1]: Mounted sysroot.mount. Dec 13 15:55:22.826185 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:55:22.828574 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:55:22.829891 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 15:55:22.830846 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 15:55:22.833968 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:55:22.834010 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:55:22.837281 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:55:22.839438 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:55:22.848681 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:55:22.863396 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:55:22.872004 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:55:22.882995 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:55:22.950645 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:55:22.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.952567 systemd[1]: Starting ignition-mount.service... Dec 13 15:55:22.954246 systemd[1]: Starting sysroot-boot.service... Dec 13 15:55:22.968294 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:55:22.980068 ignition[803]: INFO : Ignition 2.14.0 Dec 13 15:55:22.980068 ignition[803]: INFO : Stage: mount Dec 13 15:55:22.981652 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:22.981652 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:22.981652 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:22.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:22.985429 ignition[803]: INFO : mount: mount passed Dec 13 15:55:22.985429 ignition[803]: INFO : Ignition finished successfully Dec 13 15:55:22.983775 systemd[1]: Finished ignition-mount.service. Dec 13 15:55:22.991221 coreos-metadata[753]: Dec 13 15:55:22.991 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:55:23.005796 systemd[1]: Finished sysroot-boot.service. Dec 13 15:55:23.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:23.007335 coreos-metadata[753]: Dec 13 15:55:23.007 INFO Fetch successful Dec 13 15:55:23.008375 coreos-metadata[753]: Dec 13 15:55:23.008 INFO wrote hostname srv-8d9xb.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 15:55:23.011207 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 15:55:23.011341 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 15:55:23.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:23.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:23.329362 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:55:23.341657 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (812) Dec 13 15:55:23.345882 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:55:23.345922 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:55:23.345941 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:55:23.353255 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:55:23.355927 systemd[1]: Starting ignition-files.service... Dec 13 15:55:23.377563 ignition[832]: INFO : Ignition 2.14.0 Dec 13 15:55:23.378657 ignition[832]: INFO : Stage: files Dec 13 15:55:23.379589 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:23.380599 ignition[832]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:23.382004 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:23.384251 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:55:23.385188 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:55:23.385188 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:55:23.389372 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:55:23.390466 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:55:23.391818 unknown[832]: wrote ssh authorized keys file for user: core Dec 13 15:55:23.392905 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:55:23.393856 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:55:23.393856 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 15:55:23.894116 systemd-networkd[709]: eth0: Gained IPv6LL Dec 13 15:55:24.253307 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 15:55:24.600233 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:55:24.600233 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:55:24.603217 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 15:55:25.173811 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 15:55:25.402184 systemd-networkd[709]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8766:24:19ff:fee6:1d9a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8766:24:19ff:fee6:1d9a/64 assigned by NDisc. Dec 13 15:55:25.402197 systemd-networkd[709]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:55:27.206526 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:55:27.206526 ignition[832]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:55:27.206526 ignition[832]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:55:27.206526 ignition[832]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 15:55:27.211652 ignition[832]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 15:55:27.229818 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 15:55:27.229866 kernel: audit: type=1130 audit(1734105327.219:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.217725 systemd[1]: Finished ignition-files.service. Dec 13 15:55:27.230945 ignition[832]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:55:27.230945 ignition[832]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:55:27.230945 ignition[832]: INFO : files: files passed Dec 13 15:55:27.230945 ignition[832]: INFO : Ignition finished successfully Dec 13 15:55:27.249174 kernel: audit: type=1130 audit(1734105327.237:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.249215 kernel: audit: type=1131 audit(1734105327.237:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.221781 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:55:27.229761 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:55:27.231115 systemd[1]: Starting ignition-quench.service... Dec 13 15:55:27.236686 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:55:27.236861 systemd[1]: Finished ignition-quench.service. Dec 13 15:55:27.253759 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:55:27.254755 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:55:27.261330 kernel: audit: type=1130 audit(1734105327.255:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.255920 systemd[1]: Reached target ignition-complete.target. Dec 13 15:55:27.263258 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:55:27.283378 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:55:27.283543 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:55:27.294983 kernel: audit: type=1130 audit(1734105327.284:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.295023 kernel: audit: type=1131 audit(1734105327.284:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.285159 systemd[1]: Reached target initrd-fs.target. Dec 13 15:55:27.295611 systemd[1]: Reached target initrd.target. Dec 13 15:55:27.296914 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:55:27.298177 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:55:27.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.316737 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:55:27.324661 kernel: audit: type=1130 audit(1734105327.316:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.324907 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:55:27.338796 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:55:27.340383 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:55:27.341920 systemd[1]: Stopped target timers.target. Dec 13 15:55:27.357340 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:55:27.357564 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:55:27.364288 kernel: audit: type=1131 audit(1734105327.358:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.359147 systemd[1]: Stopped target initrd.target. Dec 13 15:55:27.364996 systemd[1]: Stopped target basic.target. Dec 13 15:55:27.366197 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:55:27.367459 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:55:27.368739 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:55:27.370000 systemd[1]: Stopped target remote-fs.target. Dec 13 15:55:27.371241 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:55:27.372520 systemd[1]: Stopped target sysinit.target. Dec 13 15:55:27.373769 systemd[1]: Stopped target local-fs.target. Dec 13 15:55:27.375123 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:55:27.376347 systemd[1]: Stopped target swap.target. Dec 13 15:55:27.377498 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:55:27.383934 kernel: audit: type=1131 audit(1734105327.378:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.377763 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:55:27.378922 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:55:27.391147 kernel: audit: type=1131 audit(1734105327.385:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.384723 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:55:27.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.384979 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:55:27.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.386102 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:55:27.386343 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:55:27.392135 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:55:27.392353 systemd[1]: Stopped ignition-files.service. Dec 13 15:55:27.394715 systemd[1]: Stopping ignition-mount.service... Dec 13 15:55:27.404949 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:55:27.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.405618 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:55:27.405910 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:55:27.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.422687 ignition[870]: INFO : Ignition 2.14.0 Dec 13 15:55:27.422687 ignition[870]: INFO : Stage: umount Dec 13 15:55:27.422687 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:55:27.422687 ignition[870]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:55:27.422687 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:55:27.422687 ignition[870]: INFO : umount: umount passed Dec 13 15:55:27.422687 ignition[870]: INFO : Ignition finished successfully Dec 13 15:55:27.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.407038 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:55:27.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.407774 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:55:27.414054 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:55:27.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.414183 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:55:27.420060 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:55:27.420218 systemd[1]: Stopped ignition-mount.service. Dec 13 15:55:27.426699 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:55:27.427109 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:55:27.427175 systemd[1]: Stopped ignition-disks.service. Dec 13 15:55:27.428103 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:55:27.428164 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:55:27.429363 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 15:55:27.429422 systemd[1]: Stopped ignition-fetch.service. Dec 13 15:55:27.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.430832 systemd[1]: Stopped target network.target. Dec 13 15:55:27.432035 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:55:27.432101 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:55:27.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.433335 systemd[1]: Stopped target paths.target. Dec 13 15:55:27.434581 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:55:27.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.437717 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:55:27.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.438956 systemd[1]: Stopped target slices.target. Dec 13 15:55:27.440203 systemd[1]: Stopped target sockets.target. Dec 13 15:55:27.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.458000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:55:27.440846 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:55:27.440897 systemd[1]: Closed iscsid.socket. Dec 13 15:55:27.442132 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:55:27.442178 systemd[1]: Closed iscsiuio.socket. Dec 13 15:55:27.443349 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:55:27.443416 systemd[1]: Stopped ignition-setup.service. Dec 13 15:55:27.444959 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:55:27.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.447269 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:55:27.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.448983 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:55:27.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.449119 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:55:27.450797 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:55:27.450863 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:55:27.450969 systemd-networkd[709]: eth0: DHCPv6 lease lost Dec 13 15:55:27.472000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:55:27.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.455090 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:55:27.455231 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:55:27.456677 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:55:27.457194 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:55:27.459170 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:55:27.459229 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:55:27.460884 systemd[1]: Stopping network-cleanup.service... Dec 13 15:55:27.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.464129 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:55:27.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.464204 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:55:27.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.465444 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:55:27.465509 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:55:27.467036 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:55:27.467098 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:55:27.468784 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:55:27.471507 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:55:27.472656 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:55:27.472923 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:55:27.475188 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:55:27.475260 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:55:27.476238 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:55:27.476330 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:55:27.479910 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:55:27.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.479981 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:55:27.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.481330 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:55:27.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.481394 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:55:27.482574 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:55:27.482685 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:55:27.485282 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:55:27.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.486214 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 15:55:27.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.486312 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 15:55:27.499113 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:55:27.499217 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:55:27.500042 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:55:27.500102 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:55:27.502752 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 15:55:27.503529 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:55:27.503739 systemd[1]: Stopped network-cleanup.service. Dec 13 15:55:27.505188 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:55:27.505317 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:55:27.520472 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:55:27.522846 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:55:27.540357 systemd[1]: Switching root. Dec 13 15:55:27.565500 iscsid[714]: iscsid shutting down. Dec 13 15:55:27.566424 systemd-journald[201]: Received SIGTERM from PID 1 (n/a). Dec 13 15:55:27.566519 systemd-journald[201]: Journal stopped Dec 13 15:55:31.558021 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:55:31.558141 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:55:31.558174 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:55:31.558205 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:55:31.558224 kernel: SELinux: policy capability open_perms=1 Dec 13 15:55:31.558288 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:55:31.558310 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:55:31.558336 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:55:31.558361 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:55:31.558380 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:55:31.558420 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:55:31.558445 systemd[1]: Successfully loaded SELinux policy in 67.149ms. Dec 13 15:55:31.558471 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.781ms. Dec 13 15:55:31.558506 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:55:31.558530 systemd[1]: Detected virtualization kvm. Dec 13 15:55:31.558550 systemd[1]: Detected architecture x86-64. Dec 13 15:55:31.558581 systemd[1]: Detected first boot. Dec 13 15:55:31.558604 systemd[1]: Hostname set to . Dec 13 15:55:31.558651 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:55:31.558673 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:55:31.558831 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:55:31.558860 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:55:31.558883 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:55:31.558905 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:55:31.558942 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:55:31.558977 systemd[1]: Stopped iscsiuio.service. Dec 13 15:55:31.559030 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:55:31.559052 systemd[1]: Stopped iscsid.service. Dec 13 15:55:31.559080 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:55:31.559100 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:55:31.559120 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:55:31.559140 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:55:31.559173 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:55:31.559196 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:55:31.559231 systemd[1]: Created slice system-getty.slice. Dec 13 15:55:31.559254 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:55:31.559275 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:55:31.559296 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:55:31.559317 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:55:31.559337 systemd[1]: Created slice user.slice. Dec 13 15:55:31.559368 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:55:31.559392 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:55:31.559422 systemd[1]: Set up automount boot.automount. Dec 13 15:55:31.559445 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:55:31.559465 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:55:31.559486 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:55:31.559505 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:55:31.559554 systemd[1]: Reached target integritysetup.target. Dec 13 15:55:31.559589 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:55:31.559611 systemd[1]: Reached target remote-fs.target. Dec 13 15:55:31.562879 systemd[1]: Reached target slices.target. Dec 13 15:55:31.562920 systemd[1]: Reached target swap.target. Dec 13 15:55:31.562942 systemd[1]: Reached target torcx.target. Dec 13 15:55:31.562964 systemd[1]: Reached target veritysetup.target. Dec 13 15:55:31.562984 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:55:31.563005 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:55:31.563025 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:55:31.563064 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:55:31.563087 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:55:31.563107 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:55:31.563127 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:55:31.563149 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:55:31.563169 systemd[1]: Mounting media.mount... Dec 13 15:55:31.563190 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:31.563210 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:55:31.563230 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:55:31.563263 systemd[1]: Mounting tmp.mount... Dec 13 15:55:31.563285 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:55:31.563306 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:55:31.563327 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:55:31.563348 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:55:31.563370 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:55:31.563391 systemd[1]: Starting modprobe@drm.service... Dec 13 15:55:31.563423 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:55:31.563447 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:55:31.563482 systemd[1]: Starting modprobe@loop.service... Dec 13 15:55:31.563514 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:55:31.563537 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:55:31.563558 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:55:31.563577 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:55:31.563597 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:55:31.563619 systemd[1]: Stopped systemd-journald.service. Dec 13 15:55:31.564694 systemd[1]: Starting systemd-journald.service... Dec 13 15:55:31.564724 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:55:31.564765 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:55:31.564790 kernel: fuse: init (API version 7.34) Dec 13 15:55:31.564812 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:55:31.564832 kernel: loop: module loaded Dec 13 15:55:31.564852 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:55:31.564872 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:55:31.564892 systemd[1]: Stopped verity-setup.service. Dec 13 15:55:31.564913 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:31.564948 systemd-journald[979]: Journal started Dec 13 15:55:31.565065 systemd-journald[979]: Runtime Journal (/run/log/journal/4c87367572e2446ba427fe2624657fe3) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:55:27.742000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:55:27.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:55:27.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:55:27.820000 audit: BPF prog-id=10 op=LOAD Dec 13 15:55:27.820000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:55:27.821000 audit: BPF prog-id=11 op=LOAD Dec 13 15:55:27.821000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:55:27.951000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:55:27.951000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:27.951000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:55:27.954000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:55:27.954000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:27.954000 audit: CWD cwd="/" Dec 13 15:55:27.954000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:27.954000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:27.954000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:55:31.298000 audit: BPF prog-id=12 op=LOAD Dec 13 15:55:31.298000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:55:31.298000 audit: BPF prog-id=13 op=LOAD Dec 13 15:55:31.298000 audit: BPF prog-id=14 op=LOAD Dec 13 15:55:31.298000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:55:31.298000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:55:31.300000 audit: BPF prog-id=15 op=LOAD Dec 13 15:55:31.300000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:55:31.301000 audit: BPF prog-id=16 op=LOAD Dec 13 15:55:31.301000 audit: BPF prog-id=17 op=LOAD Dec 13 15:55:31.301000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:55:31.301000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:55:31.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.312000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:55:31.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.486000 audit: BPF prog-id=18 op=LOAD Dec 13 15:55:31.486000 audit: BPF prog-id=19 op=LOAD Dec 13 15:55:31.486000 audit: BPF prog-id=20 op=LOAD Dec 13 15:55:31.486000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:55:31.486000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:55:31.553000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:55:31.553000 audit[979]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffccaeb1e80 a2=4000 a3=7ffccaeb1f1c items=0 ppid=1 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:31.553000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:55:31.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.295523 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:55:27.948677 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:55:31.570813 systemd[1]: Started systemd-journald.service. Dec 13 15:55:31.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.295551 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 15:55:27.949404 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:55:31.303869 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:55:27.949445 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:55:31.568743 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:55:27.949505 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:55:31.569710 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:55:27.949523 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:55:27.949591 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:55:27.949614 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:55:27.950032 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:55:27.950106 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:55:27.950134 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:55:27.950960 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:55:27.951030 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:55:31.573298 systemd[1]: Mounted media.mount. Dec 13 15:55:27.951061 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:55:27.951096 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:55:31.574128 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:55:31.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:27.951126 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:55:31.574896 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:55:27.951157 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:55:31.575626 systemd[1]: Mounted tmp.mount. Dec 13 15:55:31.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:30.722724 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:55:31.579059 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:55:30.723147 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:55:31.580184 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:55:30.723344 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:55:31.580404 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:55:30.723732 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:55:31.581836 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:55:30.723822 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:55:31.582063 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:55:30.723942 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-12-13T15:55:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:55:31.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.583229 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:55:31.583408 systemd[1]: Finished modprobe@drm.service. Dec 13 15:55:31.584502 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:55:31.584694 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:55:31.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.585873 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:55:31.586064 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:55:31.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.587071 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:55:31.587273 systemd[1]: Finished modprobe@loop.service. Dec 13 15:55:31.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.588315 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:55:31.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.589320 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:55:31.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.592030 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:55:31.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.593032 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:55:31.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.595771 systemd[1]: Reached target network-pre.target. Dec 13 15:55:31.599829 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:55:31.604452 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:55:31.608877 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:55:31.612062 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:55:31.615394 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:55:31.616377 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:55:31.618193 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:55:31.619868 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:55:31.622858 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:55:31.635579 systemd-journald[979]: Time spent on flushing to /var/log/journal/4c87367572e2446ba427fe2624657fe3 is 64.002ms for 1289 entries. Dec 13 15:55:31.635579 systemd-journald[979]: System Journal (/var/log/journal/4c87367572e2446ba427fe2624657fe3) is 8.0M, max 584.8M, 576.8M free. Dec 13 15:55:31.713488 systemd-journald[979]: Received client request to flush runtime journal. Dec 13 15:55:31.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.625547 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:55:31.629278 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:55:31.633669 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:55:31.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.638549 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:55:31.639405 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:55:31.666968 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:55:31.682820 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:55:31.686021 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:55:31.715974 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:55:31.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.747140 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:55:31.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:31.806899 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:55:31.809548 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:55:31.821937 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 15:55:32.320237 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:55:32.333400 kernel: kauditd_printk_skb: 102 callbacks suppressed Dec 13 15:55:32.333501 kernel: audit: type=1130 audit(1734105332.324:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.331000 audit: BPF prog-id=21 op=LOAD Dec 13 15:55:32.335807 kernel: audit: type=1334 audit(1734105332.331:143): prog-id=21 op=LOAD Dec 13 15:55:32.335858 kernel: audit: type=1334 audit(1734105332.331:144): prog-id=22 op=LOAD Dec 13 15:55:32.335894 kernel: audit: type=1334 audit(1734105332.331:145): prog-id=7 op=UNLOAD Dec 13 15:55:32.335934 kernel: audit: type=1334 audit(1734105332.331:146): prog-id=8 op=UNLOAD Dec 13 15:55:32.331000 audit: BPF prog-id=22 op=LOAD Dec 13 15:55:32.331000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:55:32.331000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:55:32.333699 systemd[1]: Starting systemd-udevd.service... Dec 13 15:55:32.372439 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Dec 13 15:55:32.407203 systemd[1]: Started systemd-udevd.service. Dec 13 15:55:32.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.413659 kernel: audit: type=1130 audit(1734105332.407:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.412000 audit: BPF prog-id=23 op=LOAD Dec 13 15:55:32.416766 kernel: audit: type=1334 audit(1734105332.412:148): prog-id=23 op=LOAD Dec 13 15:55:32.416564 systemd[1]: Starting systemd-networkd.service... Dec 13 15:55:32.432655 kernel: audit: type=1334 audit(1734105332.428:149): prog-id=24 op=LOAD Dec 13 15:55:32.434610 kernel: audit: type=1334 audit(1734105332.430:150): prog-id=25 op=LOAD Dec 13 15:55:32.434684 kernel: audit: type=1334 audit(1734105332.432:151): prog-id=26 op=LOAD Dec 13 15:55:32.428000 audit: BPF prog-id=24 op=LOAD Dec 13 15:55:32.430000 audit: BPF prog-id=25 op=LOAD Dec 13 15:55:32.432000 audit: BPF prog-id=26 op=LOAD Dec 13 15:55:32.434934 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:55:32.483292 systemd[1]: Started systemd-userdbd.service. Dec 13 15:55:32.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.526489 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 15:55:32.601013 systemd-networkd[1018]: lo: Link UP Dec 13 15:55:32.601028 systemd-networkd[1018]: lo: Gained carrier Dec 13 15:55:32.601929 systemd-networkd[1018]: Enumeration completed Dec 13 15:55:32.602083 systemd[1]: Started systemd-networkd.service. Dec 13 15:55:32.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.603458 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:55:32.606182 systemd-networkd[1018]: eth0: Link UP Dec 13 15:55:32.606196 systemd-networkd[1018]: eth0: Gained carrier Dec 13 15:55:32.620865 systemd-networkd[1018]: eth0: DHCPv4 address 10.230.29.154/30, gateway 10.230.29.153 acquired from 10.230.29.153 Dec 13 15:55:32.636834 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:55:32.639908 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:55:32.657715 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Dec 13 15:55:32.673676 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:55:32.713000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:55:32.713000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ff7219080 a1=337fc a2=7f5e2a99cbc5 a3=5 items=110 ppid=1015 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:32.713000 audit: CWD cwd="/" Dec 13 15:55:32.713000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=1 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=2 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=3 name=(null) inode=16386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=4 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=5 name=(null) inode=16387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=6 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=7 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=8 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=9 name=(null) inode=16389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=10 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=11 name=(null) inode=16390 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=12 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=13 name=(null) inode=16391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=14 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=15 name=(null) inode=16392 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=16 name=(null) inode=16388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=17 name=(null) inode=16393 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=18 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=19 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=20 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=21 name=(null) inode=16395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=22 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=23 name=(null) inode=16396 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=24 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=25 name=(null) inode=16397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=26 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=27 name=(null) inode=16398 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=28 name=(null) inode=16394 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=29 name=(null) inode=16399 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=30 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=31 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=32 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=33 name=(null) inode=16401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=34 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=35 name=(null) inode=16402 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=36 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=37 name=(null) inode=16403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=38 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=39 name=(null) inode=16404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=40 name=(null) inode=16400 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=41 name=(null) inode=16405 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=42 name=(null) inode=16385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=43 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=44 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=45 name=(null) inode=16407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=46 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=47 name=(null) inode=16408 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=48 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=49 name=(null) inode=16409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=50 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=51 name=(null) inode=16410 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=52 name=(null) inode=16406 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=53 name=(null) inode=16411 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=55 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=56 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=57 name=(null) inode=16413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=58 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=59 name=(null) inode=16414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=60 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=61 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=62 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=63 name=(null) inode=16416 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=64 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=65 name=(null) inode=16417 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=66 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=67 name=(null) inode=16418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=68 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=69 name=(null) inode=16419 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=70 name=(null) inode=16415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=71 name=(null) inode=16420 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=72 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=73 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=74 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=75 name=(null) inode=16422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=76 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=77 name=(null) inode=16423 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=78 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=79 name=(null) inode=16424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=80 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=81 name=(null) inode=16425 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=82 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=83 name=(null) inode=16426 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=84 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=85 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=86 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=87 name=(null) inode=16428 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=88 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=89 name=(null) inode=16429 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=90 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=91 name=(null) inode=16430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=92 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=93 name=(null) inode=16431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=94 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=95 name=(null) inode=16432 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=96 name=(null) inode=16412 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=97 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=98 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=99 name=(null) inode=16434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=100 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=101 name=(null) inode=16435 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=102 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=103 name=(null) inode=16436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=104 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=105 name=(null) inode=16437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=106 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=107 name=(null) inode=16438 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PATH item=109 name=(null) inode=16439 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:55:32.713000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:55:32.772725 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Dec 13 15:55:32.793677 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 15:55:32.812128 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 15:55:32.812469 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 15:55:32.954432 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:55:32.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:32.957489 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:55:32.982942 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:55:33.014461 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:55:33.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.015417 systemd[1]: Reached target cryptsetup.target. Dec 13 15:55:33.018055 systemd[1]: Starting lvm2-activation.service... Dec 13 15:55:33.024863 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:55:33.057297 systemd[1]: Finished lvm2-activation.service. Dec 13 15:55:33.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.058338 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:55:33.059037 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:55:33.059094 systemd[1]: Reached target local-fs.target. Dec 13 15:55:33.059751 systemd[1]: Reached target machines.target. Dec 13 15:55:33.062715 systemd[1]: Starting ldconfig.service... Dec 13 15:55:33.064007 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.064073 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:33.066538 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:55:33.069017 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:55:33.077285 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:55:33.081026 systemd[1]: Starting systemd-sysext.service... Dec 13 15:55:33.083758 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1047 (bootctl) Dec 13 15:55:33.086168 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:55:33.105958 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:55:33.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.110276 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:55:33.127129 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:55:33.127407 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:55:33.146675 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 15:55:33.227103 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:55:33.228159 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:55:33.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.245817 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:55:33.271690 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 15:55:33.288799 (sd-sysext)[1059]: Using extensions 'kubernetes'. Dec 13 15:55:33.290931 (sd-sysext)[1059]: Merged extensions into '/usr'. Dec 13 15:55:33.322682 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:33.328836 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Dec 13 15:55:33.328836 systemd-fsck[1056]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 15:55:33.329882 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:55:33.335671 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.339261 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:55:33.344400 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:55:33.348136 systemd[1]: Starting modprobe@loop.service... Dec 13 15:55:33.351748 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.351927 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:33.352096 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:33.356866 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:55:33.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.358096 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:55:33.359276 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:55:33.359527 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:55:33.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.360762 systemd[1]: Finished systemd-sysext.service. Dec 13 15:55:33.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.361964 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:55:33.362134 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:55:33.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.363232 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:55:33.363424 systemd[1]: Finished modprobe@loop.service. Dec 13 15:55:33.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.369369 systemd[1]: Mounting boot.mount... Dec 13 15:55:33.375552 systemd[1]: Starting ensure-sysext.service... Dec 13 15:55:33.378726 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:55:33.378832 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.381383 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:55:33.396692 systemd[1]: Mounted boot.mount. Dec 13 15:55:33.398405 systemd[1]: Reloading. Dec 13 15:55:33.404246 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:55:33.409627 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:55:33.421610 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:55:33.522481 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T15:55:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:55:33.522536 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T15:55:33Z" level=info msg="torcx already run" Dec 13 15:55:33.628692 ldconfig[1046]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:55:33.673500 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:55:33.673538 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:55:33.701832 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:55:33.786000 audit: BPF prog-id=27 op=LOAD Dec 13 15:55:33.786000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:55:33.786000 audit: BPF prog-id=28 op=LOAD Dec 13 15:55:33.786000 audit: BPF prog-id=29 op=LOAD Dec 13 15:55:33.786000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:55:33.786000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:55:33.787000 audit: BPF prog-id=30 op=LOAD Dec 13 15:55:33.787000 audit: BPF prog-id=31 op=LOAD Dec 13 15:55:33.787000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:55:33.788000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:55:33.789000 audit: BPF prog-id=32 op=LOAD Dec 13 15:55:33.790000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:55:33.791000 audit: BPF prog-id=33 op=LOAD Dec 13 15:55:33.791000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:55:33.791000 audit: BPF prog-id=34 op=LOAD Dec 13 15:55:33.791000 audit: BPF prog-id=35 op=LOAD Dec 13 15:55:33.791000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:55:33.791000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:55:33.807966 systemd[1]: Finished ldconfig.service. Dec 13 15:55:33.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.811897 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:55:33.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.814431 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:55:33.820783 systemd[1]: Starting audit-rules.service... Dec 13 15:55:33.829000 audit: BPF prog-id=36 op=LOAD Dec 13 15:55:33.823215 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:55:33.827972 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:55:33.832486 systemd[1]: Starting systemd-resolved.service... Dec 13 15:55:33.833000 audit: BPF prog-id=37 op=LOAD Dec 13 15:55:33.836291 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:55:33.839873 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:55:33.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.842909 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:55:33.844196 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:55:33.851000 audit[1140]: SYSTEM_BOOT pid=1140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.862011 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:55:33.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.864163 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.867561 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:55:33.871328 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:55:33.875261 systemd[1]: Starting modprobe@loop.service... Dec 13 15:55:33.876883 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.877141 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:33.877440 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:55:33.879952 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:55:33.880173 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:55:33.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.883054 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:55:33.883245 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:55:33.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.884590 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:55:33.884929 systemd[1]: Finished modprobe@loop.service. Dec 13 15:55:33.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.890173 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.893862 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:55:33.898568 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:55:33.901691 systemd[1]: Starting modprobe@loop.service... Dec 13 15:55:33.902704 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.902990 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:33.903306 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:55:33.905563 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:55:33.906230 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:55:33.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.908469 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:55:33.908709 systemd[1]: Finished modprobe@loop.service. Dec 13 15:55:33.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.910077 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:55:33.910265 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:55:33.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.916916 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.920144 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:55:33.923564 systemd[1]: Starting modprobe@drm.service... Dec 13 15:55:33.928692 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:55:33.932024 systemd[1]: Starting modprobe@loop.service... Dec 13 15:55:33.933177 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.933393 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:33.937732 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:55:33.938684 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:55:33.941484 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:55:33.941778 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:55:33.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.944023 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:55:33.944233 systemd[1]: Finished modprobe@drm.service. Dec 13 15:55:33.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.946535 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:55:33.946732 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:55:33.948238 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:55:33.948431 systemd[1]: Finished modprobe@loop.service. Dec 13 15:55:33.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.951033 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:55:33.951235 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:55:33.952747 systemd[1]: Finished ensure-sysext.service. Dec 13 15:55:33.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.972147 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:55:33.974233 augenrules[1165]: No rules Dec 13 15:55:33.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:33.973000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:55:33.973000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc20906360 a2=420 a3=0 items=0 ppid=1134 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:33.973000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:55:33.974805 systemd[1]: Starting systemd-update-done.service... Dec 13 15:55:33.976087 systemd[1]: Finished audit-rules.service. Dec 13 15:55:33.991076 systemd[1]: Finished systemd-update-done.service. Dec 13 15:55:34.005275 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:55:34.006228 systemd[1]: Reached target time-set.target. Dec 13 15:55:34.025302 systemd-resolved[1137]: Positive Trust Anchors: Dec 13 15:55:34.025352 systemd-resolved[1137]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:55:34.025396 systemd-resolved[1137]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:55:34.033133 systemd-resolved[1137]: Using system hostname 'srv-8d9xb.gb1.brightbox.com'. Dec 13 15:55:34.035914 systemd[1]: Started systemd-resolved.service. Dec 13 15:55:34.036766 systemd[1]: Reached target network.target. Dec 13 15:55:34.037394 systemd[1]: Reached target nss-lookup.target. Dec 13 15:55:34.038030 systemd[1]: Reached target sysinit.target. Dec 13 15:55:34.038762 systemd[1]: Started motdgen.path. Dec 13 15:55:34.039376 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:55:34.040364 systemd[1]: Started logrotate.timer. Dec 13 15:55:34.041089 systemd[1]: Started mdadm.timer. Dec 13 15:55:34.041677 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:55:34.042319 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:55:34.042383 systemd[1]: Reached target paths.target. Dec 13 15:55:34.043015 systemd[1]: Reached target timers.target. Dec 13 15:55:34.044095 systemd[1]: Listening on dbus.socket. Dec 13 15:55:34.046423 systemd[1]: Starting docker.socket... Dec 13 15:55:34.051004 systemd[1]: Listening on sshd.socket. Dec 13 15:55:34.051789 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:34.052445 systemd[1]: Listening on docker.socket. Dec 13 15:55:34.053219 systemd[1]: Reached target sockets.target. Dec 13 15:55:34.053858 systemd[1]: Reached target basic.target. Dec 13 15:55:34.054517 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:55:34.054565 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:55:34.056279 systemd[1]: Starting containerd.service... Dec 13 15:55:34.059598 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:55:34.076886 systemd[1]: Starting dbus.service... Dec 13 15:55:34.084714 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:55:34.088192 systemd[1]: Starting extend-filesystems.service... Dec 13 15:55:34.090038 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:55:34.092146 systemd[1]: Starting motdgen.service... Dec 13 15:55:34.097625 systemd[1]: Starting prepare-helm.service... Dec 13 15:55:34.100234 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:55:34.106188 systemd[1]: Starting sshd-keygen.service... Dec 13 15:55:34.112829 systemd[1]: Starting systemd-logind.service... Dec 13 15:55:34.119141 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:55:34.119381 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 15:55:34.121041 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:55:34.122400 systemd[1]: Starting update-engine.service... Dec 13 15:55:34.125242 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:55:34.129661 jq[1196]: true Dec 13 15:55:34.141944 jq[1179]: false Dec 13 15:55:34.150252 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:55:34.150577 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:55:34.151297 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:55:34.151530 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:55:34.152778 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:34.152844 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:55:34.165450 dbus-daemon[1178]: [system] SELinux support is enabled Dec 13 15:55:34.165703 systemd[1]: Started dbus.service. Dec 13 15:55:34.169399 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:55:34.169456 systemd[1]: Reached target system-config.target. Dec 13 15:55:34.170168 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:55:34.170210 systemd[1]: Reached target user-config.target. Dec 13 15:55:34.171703 jq[1202]: true Dec 13 15:55:34.176058 extend-filesystems[1181]: Found loop1 Dec 13 15:55:34.181201 tar[1200]: linux-amd64/helm Dec 13 15:55:34.185927 extend-filesystems[1181]: Found vda Dec 13 15:55:34.185927 extend-filesystems[1181]: Found vda1 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda2 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda3 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found usr Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda4 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda6 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda7 Dec 13 15:55:34.189878 extend-filesystems[1181]: Found vda9 Dec 13 15:55:34.189878 extend-filesystems[1181]: Checking size of /dev/vda9 Dec 13 15:55:34.188212 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:55:34.195044 dbus-daemon[1178]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1018 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 15:55:34.188482 systemd[1]: Finished motdgen.service. Dec 13 15:55:34.199916 systemd[1]: Starting systemd-hostnamed.service... Dec 13 15:55:34.252131 extend-filesystems[1181]: Resized partition /dev/vda9 Dec 13 15:55:34.267759 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:55:34.280039 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 15:55:34.314739 update_engine[1195]: I1213 15:55:34.305495 1195 main.cc:92] Flatcar Update Engine starting Dec 13 15:55:34.314739 update_engine[1195]: I1213 15:55:34.311834 1195 update_check_scheduler.cc:74] Next update check in 6m46s Dec 13 15:55:34.311087 systemd[1]: Started update-engine.service. Dec 13 15:55:34.315137 systemd[1]: Started locksmithd.service. Dec 13 15:55:34.316390 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:55:34.317474 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:55:34.326206 systemd-networkd[1018]: eth0: Gained IPv6LL Dec 13 15:55:34.329753 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:55:34.330598 systemd[1]: Reached target network-online.target. Dec 13 15:55:34.333479 systemd[1]: Starting kubelet.service... Dec 13 15:55:34.380760 systemd-logind[1190]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 15:55:34.380818 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 15:55:34.385856 systemd-logind[1190]: New seat seat0. Dec 13 15:55:34.389419 env[1203]: time="2024-12-13T15:55:34.389173285Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:55:34.397593 systemd[1]: Started systemd-logind.service. Dec 13 15:55:35.137701 systemd-resolved[1137]: Clock change detected. Flushing caches. Dec 13 15:55:35.138102 systemd-timesyncd[1139]: Contacted time server 178.215.228.24:123 (0.flatcar.pool.ntp.org). Dec 13 15:55:35.138196 systemd-timesyncd[1139]: Initial clock synchronization to Fri 2024-12-13 15:55:35.137613 UTC. Dec 13 15:55:35.171826 dbus-daemon[1178]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 15:55:35.172002 systemd[1]: Started systemd-hostnamed.service. Dec 13 15:55:35.173822 dbus-daemon[1178]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1209 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 15:55:35.177618 systemd[1]: Starting polkit.service... Dec 13 15:55:35.197992 polkitd[1237]: Started polkitd version 121 Dec 13 15:55:35.221655 env[1203]: time="2024-12-13T15:55:35.221553972Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:55:35.222110 env[1203]: time="2024-12-13T15:55:35.221915019Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.223142 polkitd[1237]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 15:55:35.223261 polkitd[1237]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 15:55:35.226789 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 15:55:35.227155 polkitd[1237]: Finished loading, compiling and executing 2 rules Dec 13 15:55:35.227832 dbus-daemon[1178]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.240793542Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.240842974Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.244660377Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.244691038Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.244712685Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.244730082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.244909377Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.245397049Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.245584255Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:55:35.246238 env[1203]: time="2024-12-13T15:55:35.245614004Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:55:35.228050 systemd[1]: Started polkit.service. Dec 13 15:55:35.230140 polkitd[1237]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 15:55:35.248947 env[1203]: time="2024-12-13T15:55:35.245693024Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:55:35.248947 env[1203]: time="2024-12-13T15:55:35.245716616Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:55:35.249059 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 15:55:35.249059 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 15:55:35.249059 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 15:55:35.249015 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.250784087Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.250820384Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.250843765Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.250925981Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.250952315Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251032476Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251055793Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251076591Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251108993Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251129117Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251149534Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251177259Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251392219Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:55:35.259107 env[1203]: time="2024-12-13T15:55:35.251560165Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:55:35.259674 extend-filesystems[1181]: Resized filesystem in /dev/vda9 Dec 13 15:55:35.249270 systemd[1]: Finished extend-filesystems.service. Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.253309847Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.253369310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.253396091Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.253503664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.253530580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255242415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255285961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255311989Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255340003Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255362981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255387156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255415126Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255668527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255695897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.265341 env[1203]: time="2024-12-13T15:55:35.255717736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.266587 env[1203]: time="2024-12-13T15:55:35.255774519Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:55:35.266587 env[1203]: time="2024-12-13T15:55:35.256957934Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:55:35.266587 env[1203]: time="2024-12-13T15:55:35.256986927Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:55:35.266587 env[1203]: time="2024-12-13T15:55:35.257039079Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:55:35.266587 env[1203]: time="2024-12-13T15:55:35.257122342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:55:35.266505 systemd-hostnamed[1209]: Hostname set to (static) Dec 13 15:55:35.267348 env[1203]: time="2024-12-13T15:55:35.257407425Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:55:35.267348 env[1203]: time="2024-12-13T15:55:35.257512870Z" level=info msg="Connect containerd service" Dec 13 15:55:35.267348 env[1203]: time="2024-12-13T15:55:35.257575930Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:55:35.278809 env[1203]: time="2024-12-13T15:55:35.278435003Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:55:35.279096 env[1203]: time="2024-12-13T15:55:35.279023645Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:55:35.279192 env[1203]: time="2024-12-13T15:55:35.279132712Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:55:35.279337 systemd[1]: Started containerd.service. Dec 13 15:55:35.280927 env[1203]: time="2024-12-13T15:55:35.280892682Z" level=info msg="containerd successfully booted in 0.168307s" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.292794827Z" level=info msg="Start subscribing containerd event" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.292884809Z" level=info msg="Start recovering state" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.293030547Z" level=info msg="Start event monitor" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.293080286Z" level=info msg="Start snapshots syncer" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.293099979Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:55:35.293362 env[1203]: time="2024-12-13T15:55:35.293114646Z" level=info msg="Start streaming server" Dec 13 15:55:35.854247 locksmithd[1232]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:55:35.969642 tar[1200]: linux-amd64/LICENSE Dec 13 15:55:35.970248 tar[1200]: linux-amd64/README.md Dec 13 15:55:35.976349 systemd[1]: Finished prepare-helm.service. Dec 13 15:55:36.210162 systemd-networkd[1018]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8766:24:19ff:fee6:1d9a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8766:24:19ff:fee6:1d9a/64 assigned by NDisc. Dec 13 15:55:36.210189 systemd-networkd[1018]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:55:36.288579 systemd[1]: Started kubelet.service. Dec 13 15:55:36.342690 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:55:36.369718 systemd[1]: Finished sshd-keygen.service. Dec 13 15:55:36.373018 systemd[1]: Starting issuegen.service... Dec 13 15:55:36.380122 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:55:36.380403 systemd[1]: Finished issuegen.service. Dec 13 15:55:36.383331 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:55:36.394487 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:55:36.397561 systemd[1]: Started getty@tty1.service. Dec 13 15:55:36.400529 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 15:55:36.401725 systemd[1]: Reached target getty.target. Dec 13 15:55:37.128391 kubelet[1258]: E1213 15:55:37.128280 1258 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:55:37.131275 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:55:37.131526 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:55:37.132095 systemd[1]: kubelet.service: Consumed 1.118s CPU time. Dec 13 15:55:41.964313 coreos-metadata[1175]: Dec 13 15:55:41.964 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:55:42.016804 coreos-metadata[1175]: Dec 13 15:55:42.016 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 15:55:42.255095 coreos-metadata[1175]: Dec 13 15:55:42.254 INFO Fetch successful Dec 13 15:55:42.255095 coreos-metadata[1175]: Dec 13 15:55:42.255 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 15:55:42.289765 coreos-metadata[1175]: Dec 13 15:55:42.289 INFO Fetch successful Dec 13 15:55:42.291872 unknown[1175]: wrote ssh authorized keys file for user: core Dec 13 15:55:42.303559 update-ssh-keys[1280]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:55:42.304594 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:55:42.305135 systemd[1]: Reached target multi-user.target. Dec 13 15:55:42.307239 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:55:42.317873 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:55:42.318103 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:55:42.318380 systemd[1]: Startup finished in 1.135s (kernel) + 7.978s (initrd) + 13.927s (userspace) = 23.041s. Dec 13 15:55:44.941563 systemd[1]: Created slice system-sshd.slice. Dec 13 15:55:44.943532 systemd[1]: Started sshd@0-10.230.29.154:22-139.178.68.195:47868.service. Dec 13 15:55:45.850821 sshd[1283]: Accepted publickey for core from 139.178.68.195 port 47868 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:45.853869 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:45.870308 systemd[1]: Created slice user-500.slice. Dec 13 15:55:45.872242 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:55:45.876898 systemd-logind[1190]: New session 1 of user core. Dec 13 15:55:45.888987 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:55:45.892992 systemd[1]: Starting user@500.service... Dec 13 15:55:45.898096 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:46.043250 systemd[1286]: Queued start job for default target default.target. Dec 13 15:55:46.045327 systemd[1286]: Reached target paths.target. Dec 13 15:55:46.045533 systemd[1286]: Reached target sockets.target. Dec 13 15:55:46.045710 systemd[1286]: Reached target timers.target. Dec 13 15:55:46.045887 systemd[1286]: Reached target basic.target. Dec 13 15:55:46.046123 systemd[1286]: Reached target default.target. Dec 13 15:55:46.046265 systemd[1]: Started user@500.service. Dec 13 15:55:46.047676 systemd[1286]: Startup finished in 140ms. Dec 13 15:55:46.047877 systemd[1]: Started session-1.scope. Dec 13 15:55:46.670231 systemd[1]: Started sshd@1-10.230.29.154:22-139.178.68.195:54354.service. Dec 13 15:55:47.201418 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:55:47.201791 systemd[1]: Stopped kubelet.service. Dec 13 15:55:47.201863 systemd[1]: kubelet.service: Consumed 1.118s CPU time. Dec 13 15:55:47.204144 systemd[1]: Starting kubelet.service... Dec 13 15:55:47.397525 systemd[1]: Started kubelet.service. Dec 13 15:55:47.475544 kubelet[1301]: E1213 15:55:47.475355 1301 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:55:47.480428 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:55:47.480642 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:55:47.552791 sshd[1295]: Accepted publickey for core from 139.178.68.195 port 54354 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:47.554204 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:47.561525 systemd-logind[1190]: New session 2 of user core. Dec 13 15:55:47.562403 systemd[1]: Started session-2.scope. Dec 13 15:55:48.169238 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 15:55:48.173507 systemd[1]: sshd@1-10.230.29.154:22-139.178.68.195:54354.service: Deactivated successfully. Dec 13 15:55:48.174574 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 15:55:48.175432 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Dec 13 15:55:48.177230 systemd-logind[1190]: Removed session 2. Dec 13 15:55:48.316435 systemd[1]: Started sshd@2-10.230.29.154:22-139.178.68.195:54360.service. Dec 13 15:55:49.203551 sshd[1311]: Accepted publickey for core from 139.178.68.195 port 54360 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:49.206230 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:49.212909 systemd-logind[1190]: New session 3 of user core. Dec 13 15:55:49.213719 systemd[1]: Started session-3.scope. Dec 13 15:55:49.817087 sshd[1311]: pam_unix(sshd:session): session closed for user core Dec 13 15:55:49.820603 systemd[1]: sshd@2-10.230.29.154:22-139.178.68.195:54360.service: Deactivated successfully. Dec 13 15:55:49.821627 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 15:55:49.822490 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Dec 13 15:55:49.823828 systemd-logind[1190]: Removed session 3. Dec 13 15:55:49.964447 systemd[1]: Started sshd@3-10.230.29.154:22-139.178.68.195:54376.service. Dec 13 15:55:50.853981 sshd[1317]: Accepted publickey for core from 139.178.68.195 port 54376 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:50.856396 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:50.862831 systemd-logind[1190]: New session 4 of user core. Dec 13 15:55:50.863633 systemd[1]: Started session-4.scope. Dec 13 15:55:51.474907 sshd[1317]: pam_unix(sshd:session): session closed for user core Dec 13 15:55:51.478840 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:55:51.479291 systemd[1]: sshd@3-10.230.29.154:22-139.178.68.195:54376.service: Deactivated successfully. Dec 13 15:55:51.480206 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:55:51.481337 systemd-logind[1190]: Removed session 4. Dec 13 15:55:51.621482 systemd[1]: Started sshd@4-10.230.29.154:22-139.178.68.195:54378.service. Dec 13 15:55:52.505877 sshd[1323]: Accepted publickey for core from 139.178.68.195 port 54378 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:52.508827 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:52.516163 systemd-logind[1190]: New session 5 of user core. Dec 13 15:55:52.517213 systemd[1]: Started session-5.scope. Dec 13 15:55:52.994482 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:55:52.994900 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:55:53.005123 dbus-daemon[1178]: \xd0M\xd7\u00134V: received setenforce notice (enforcing=-1621702784) Dec 13 15:55:53.007983 sudo[1326]: pam_unix(sudo:session): session closed for user root Dec 13 15:55:53.153554 sshd[1323]: pam_unix(sshd:session): session closed for user core Dec 13 15:55:53.159252 systemd[1]: sshd@4-10.230.29.154:22-139.178.68.195:54378.service: Deactivated successfully. Dec 13 15:55:53.160908 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:55:53.162132 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:55:53.164000 systemd-logind[1190]: Removed session 5. Dec 13 15:55:53.304509 systemd[1]: Started sshd@5-10.230.29.154:22-139.178.68.195:54394.service. Dec 13 15:55:54.195725 sshd[1330]: Accepted publickey for core from 139.178.68.195 port 54394 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:54.198272 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:54.205575 systemd-logind[1190]: New session 6 of user core. Dec 13 15:55:54.206535 systemd[1]: Started session-6.scope. Dec 13 15:55:54.675658 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:55:54.676677 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:55:54.682134 sudo[1334]: pam_unix(sudo:session): session closed for user root Dec 13 15:55:54.689694 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:55:54.690106 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:55:54.704408 systemd[1]: Stopping audit-rules.service... Dec 13 15:55:54.704000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:55:54.706280 auditctl[1337]: No rules Dec 13 15:55:54.707319 kernel: kauditd_printk_skb: 180 callbacks suppressed Dec 13 15:55:54.707464 kernel: audit: type=1305 audit(1734105354.704:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:55:54.707949 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:55:54.708198 systemd[1]: Stopped audit-rules.service. Dec 13 15:55:54.716125 kernel: audit: type=1300 audit(1734105354.704:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe78be12f0 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:54.704000 audit[1337]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe78be12f0 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:54.713995 systemd[1]: Starting audit-rules.service... Dec 13 15:55:54.726262 kernel: audit: type=1327 audit(1734105354.704:217): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:55:54.726336 kernel: audit: type=1131 audit(1734105354.706:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.704000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:55:54.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.742064 augenrules[1354]: No rules Dec 13 15:55:54.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.743186 systemd[1]: Finished audit-rules.service. Dec 13 15:55:54.744459 sudo[1333]: pam_unix(sudo:session): session closed for user root Dec 13 15:55:54.743000 audit[1333]: USER_END pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.756675 kernel: audit: type=1130 audit(1734105354.742:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.756804 kernel: audit: type=1106 audit(1734105354.743:220): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.756875 kernel: audit: type=1104 audit(1734105354.743:221): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.743000 audit[1333]: CRED_DISP pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.888728 sshd[1330]: pam_unix(sshd:session): session closed for user core Dec 13 15:55:54.889000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:54.898858 kernel: audit: type=1106 audit(1734105354.889:222): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:54.890000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:54.899333 systemd[1]: sshd@5-10.230.29.154:22-139.178.68.195:54394.service: Deactivated successfully. Dec 13 15:55:54.900357 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:55:54.905789 kernel: audit: type=1104 audit(1734105354.890:223): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:54.905862 kernel: audit: type=1131 audit(1734105354.898:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.29.154:22-139.178.68.195:54394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.29.154:22-139.178.68.195:54394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:54.906090 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:55:54.912810 systemd-logind[1190]: Removed session 6. Dec 13 15:55:55.035514 systemd[1]: Started sshd@6-10.230.29.154:22-139.178.68.195:54398.service. Dec 13 15:55:55.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.29.154:22-139.178.68.195:54398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:55.921000 audit[1360]: USER_ACCT pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:55.922175 sshd[1360]: Accepted publickey for core from 139.178.68.195 port 54398 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:55:55.922000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:55.922000 audit[1360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb7105af0 a2=3 a3=0 items=0 ppid=1 pid=1360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:55.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:55:55.924436 sshd[1360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:55:55.931919 systemd[1]: Started session-7.scope. Dec 13 15:55:55.932911 systemd-logind[1190]: New session 7 of user core. Dec 13 15:55:55.939000 audit[1360]: USER_START pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:55.941000 audit[1362]: CRED_ACQ pid=1362 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:55:56.409000 audit[1363]: USER_ACCT pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:56.411160 sudo[1363]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:55:56.411000 audit[1363]: CRED_REFR pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:56.412174 sudo[1363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:55:56.414000 audit[1363]: USER_START pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:55:56.462453 systemd[1]: Starting docker.service... Dec 13 15:55:56.526070 env[1373]: time="2024-12-13T15:55:56.525959921Z" level=info msg="Starting up" Dec 13 15:55:56.530135 env[1373]: time="2024-12-13T15:55:56.530102787Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:55:56.530272 env[1373]: time="2024-12-13T15:55:56.530242069Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:55:56.530408 env[1373]: time="2024-12-13T15:55:56.530375975Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:55:56.530524 env[1373]: time="2024-12-13T15:55:56.530496313Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:55:56.534042 env[1373]: time="2024-12-13T15:55:56.533998759Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:55:56.534042 env[1373]: time="2024-12-13T15:55:56.534030108Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:55:56.534295 env[1373]: time="2024-12-13T15:55:56.534049644Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:55:56.534295 env[1373]: time="2024-12-13T15:55:56.534067037Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:55:56.543628 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1867242476-merged.mount: Deactivated successfully. Dec 13 15:55:56.567779 env[1373]: time="2024-12-13T15:55:56.567699539Z" level=info msg="Loading containers: start." Dec 13 15:55:56.655000 audit[1406]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.655000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff3676fa20 a2=0 a3=7fff3676fa0c items=0 ppid=1373 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 15:55:56.658000 audit[1408]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.658000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcd0abb150 a2=0 a3=7ffcd0abb13c items=0 ppid=1373 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 15:55:56.662000 audit[1410]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.662000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcf520cdb0 a2=0 a3=7ffcf520cd9c items=0 ppid=1373 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:55:56.666000 audit[1412]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.666000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffd11dec50 a2=0 a3=7fffd11dec3c items=0 ppid=1373 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.666000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:55:56.670000 audit[1414]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.670000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe12b2a20 a2=0 a3=7fffe12b2a0c items=0 ppid=1373 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 15:55:56.691000 audit[1419]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.691000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7353e600 a2=0 a3=7ffe7353e5ec items=0 ppid=1373 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 15:55:56.709000 audit[1421]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.709000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee8d2f410 a2=0 a3=7ffee8d2f3fc items=0 ppid=1373 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 15:55:56.713000 audit[1423]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.713000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcd7259b10 a2=0 a3=7ffcd7259afc items=0 ppid=1373 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 15:55:56.716000 audit[1425]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.716000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd72c61c40 a2=0 a3=7ffd72c61c2c items=0 ppid=1373 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.716000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:55:56.725000 audit[1429]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.725000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff60e63e30 a2=0 a3=7fff60e63e1c items=0 ppid=1373 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.725000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:55:56.731000 audit[1430]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.731000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc4f71ae70 a2=0 a3=7ffc4f71ae5c items=0 ppid=1373 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:55:56.747790 kernel: Initializing XFRM netlink socket Dec 13 15:55:56.795701 env[1373]: time="2024-12-13T15:55:56.795577316Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 15:55:56.840000 audit[1438]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.840000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff087bada0 a2=0 a3=7fff087bad8c items=0 ppid=1373 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 15:55:56.854000 audit[1441]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.854000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc98dc5870 a2=0 a3=7ffc98dc585c items=0 ppid=1373 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.854000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 15:55:56.859000 audit[1444]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.859000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff3b8461f0 a2=0 a3=7fff3b8461dc items=0 ppid=1373 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 15:55:56.862000 audit[1446]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.862000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffd835e3a0 a2=0 a3=7fffd835e38c items=0 ppid=1373 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 15:55:56.865000 audit[1448]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.865000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe00bf38c0 a2=0 a3=7ffe00bf38ac items=0 ppid=1373 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 15:55:56.868000 audit[1450]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.868000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff3105e710 a2=0 a3=7fff3105e6fc items=0 ppid=1373 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 15:55:56.871000 audit[1452]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.871000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe9f007180 a2=0 a3=7ffe9f00716c items=0 ppid=1373 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 15:55:56.884000 audit[1455]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.884000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd850101a0 a2=0 a3=7ffd8501018c items=0 ppid=1373 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 15:55:56.887000 audit[1457]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.887000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdace13810 a2=0 a3=7ffdace137fc items=0 ppid=1373 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:55:56.891000 audit[1459]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.891000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffef2cf4800 a2=0 a3=7ffef2cf47ec items=0 ppid=1373 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:55:56.895000 audit[1461]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.895000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6d0eb6f0 a2=0 a3=7ffd6d0eb6dc items=0 ppid=1373 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 15:55:56.896841 systemd-networkd[1018]: docker0: Link UP Dec 13 15:55:56.906000 audit[1465]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.906000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff406eeb30 a2=0 a3=7fff406eeb1c items=0 ppid=1373 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:55:56.912000 audit[1466]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:55:56.912000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc95d63640 a2=0 a3=7ffc95d6362c items=0 ppid=1373 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:55:56.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:55:56.914084 env[1373]: time="2024-12-13T15:55:56.914030395Z" level=info msg="Loading containers: done." Dec 13 15:55:56.934664 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4148836331-merged.mount: Deactivated successfully. Dec 13 15:55:56.944374 env[1373]: time="2024-12-13T15:55:56.944296211Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 15:55:56.945045 env[1373]: time="2024-12-13T15:55:56.945016166Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 15:55:56.945433 env[1373]: time="2024-12-13T15:55:56.945389719Z" level=info msg="Daemon has completed initialization" Dec 13 15:55:56.968258 systemd[1]: Started docker.service. Dec 13 15:55:56.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:56.973818 env[1373]: time="2024-12-13T15:55:56.973536864Z" level=info msg="API listen on /run/docker.sock" Dec 13 15:55:57.703040 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:55:57.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:57.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:57.703627 systemd[1]: Stopped kubelet.service. Dec 13 15:55:57.707387 systemd[1]: Starting kubelet.service... Dec 13 15:55:57.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:57.854361 systemd[1]: Started kubelet.service. Dec 13 15:55:57.970230 kubelet[1503]: E1213 15:55:57.969603 1503 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:55:57.972758 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:55:57.973007 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:55:57.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:55:58.444340 env[1203]: time="2024-12-13T15:55:58.444038625Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 15:55:59.157934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1379604665.mount: Deactivated successfully. Dec 13 15:56:01.808383 env[1203]: time="2024-12-13T15:56:01.808285604Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:01.810763 env[1203]: time="2024-12-13T15:56:01.810705989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:01.813706 env[1203]: time="2024-12-13T15:56:01.813640591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:01.817540 env[1203]: time="2024-12-13T15:56:01.817444391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:01.819853 env[1203]: time="2024-12-13T15:56:01.819803133Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 15:56:01.837803 env[1203]: time="2024-12-13T15:56:01.837729197Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 15:56:04.943095 env[1203]: time="2024-12-13T15:56:04.943017639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:04.945278 env[1203]: time="2024-12-13T15:56:04.945226082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:04.947895 env[1203]: time="2024-12-13T15:56:04.947861202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:04.950285 env[1203]: time="2024-12-13T15:56:04.950249432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:04.951502 env[1203]: time="2024-12-13T15:56:04.951462552Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 15:56:04.966109 env[1203]: time="2024-12-13T15:56:04.966060380Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 15:56:06.226709 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 15:56:06.235572 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 15:56:06.235711 kernel: audit: type=1131 audit(1734105366.226:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:06.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:06.251000 audit: BPF prog-id=43 op=UNLOAD Dec 13 15:56:06.251000 audit: BPF prog-id=42 op=UNLOAD Dec 13 15:56:06.255385 kernel: audit: type=1334 audit(1734105366.251:264): prog-id=43 op=UNLOAD Dec 13 15:56:06.255476 kernel: audit: type=1334 audit(1734105366.251:265): prog-id=42 op=UNLOAD Dec 13 15:56:06.255525 kernel: audit: type=1334 audit(1734105366.251:266): prog-id=41 op=UNLOAD Dec 13 15:56:06.251000 audit: BPF prog-id=41 op=UNLOAD Dec 13 15:56:06.670982 env[1203]: time="2024-12-13T15:56:06.670798519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:06.673217 env[1203]: time="2024-12-13T15:56:06.673172103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:06.675652 env[1203]: time="2024-12-13T15:56:06.675615069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:06.676820 env[1203]: time="2024-12-13T15:56:06.676766208Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 15:56:06.679834 env[1203]: time="2024-12-13T15:56:06.679798559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:06.691046 env[1203]: time="2024-12-13T15:56:06.691004071Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 15:56:08.201229 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:56:08.201531 systemd[1]: Stopped kubelet.service. Dec 13 15:56:08.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.211299 kernel: audit: type=1130 audit(1734105368.200:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.214420 kernel: audit: type=1131 audit(1734105368.200:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.211886 systemd[1]: Starting kubelet.service... Dec 13 15:56:08.363857 systemd[1]: Started kubelet.service. Dec 13 15:56:08.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.370782 kernel: audit: type=1130 audit(1734105368.363:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:08.398038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2773988015.mount: Deactivated successfully. Dec 13 15:56:08.468770 kubelet[1537]: E1213 15:56:08.467246 1537 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:56:08.471161 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:56:08.471424 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:56:08.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:56:08.479772 kernel: audit: type=1131 audit(1734105368.471:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:56:09.352403 env[1203]: time="2024-12-13T15:56:09.352276298Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:09.354811 env[1203]: time="2024-12-13T15:56:09.354769585Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:09.356657 env[1203]: time="2024-12-13T15:56:09.356617957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:09.358166 env[1203]: time="2024-12-13T15:56:09.358128169Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:09.359111 env[1203]: time="2024-12-13T15:56:09.359042146Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 15:56:09.372041 env[1203]: time="2024-12-13T15:56:09.371992515Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 15:56:10.032098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1310239532.mount: Deactivated successfully. Dec 13 15:56:11.482575 env[1203]: time="2024-12-13T15:56:11.482506053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:11.484754 env[1203]: time="2024-12-13T15:56:11.484700189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:11.488209 env[1203]: time="2024-12-13T15:56:11.488169106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:11.491694 env[1203]: time="2024-12-13T15:56:11.491654062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:11.493063 env[1203]: time="2024-12-13T15:56:11.493021334Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 15:56:11.511391 env[1203]: time="2024-12-13T15:56:11.511279490Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 15:56:12.093014 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292301261.mount: Deactivated successfully. Dec 13 15:56:12.099367 env[1203]: time="2024-12-13T15:56:12.099270173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:12.101359 env[1203]: time="2024-12-13T15:56:12.101308078Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:12.103187 env[1203]: time="2024-12-13T15:56:12.103152300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:12.105425 env[1203]: time="2024-12-13T15:56:12.105384926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:12.106273 env[1203]: time="2024-12-13T15:56:12.106234944Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 15:56:12.119395 env[1203]: time="2024-12-13T15:56:12.119307661Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 15:56:12.706054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3659159520.mount: Deactivated successfully. Dec 13 15:56:17.394467 env[1203]: time="2024-12-13T15:56:17.394398345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:17.396656 env[1203]: time="2024-12-13T15:56:17.396620356Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:17.399286 env[1203]: time="2024-12-13T15:56:17.399239496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:17.401844 env[1203]: time="2024-12-13T15:56:17.401801582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:17.403406 env[1203]: time="2024-12-13T15:56:17.403356320Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 15:56:18.620118 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 15:56:18.629810 kernel: audit: type=1130 audit(1734105378.618:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:18.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:18.620420 systemd[1]: Stopped kubelet.service. Dec 13 15:56:18.631569 systemd[1]: Starting kubelet.service... Dec 13 15:56:18.637937 kernel: audit: type=1131 audit(1734105378.618:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:18.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:19.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:19.229630 systemd[1]: Started kubelet.service. Dec 13 15:56:19.236845 kernel: audit: type=1130 audit(1734105379.228:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:19.336506 kubelet[1625]: E1213 15:56:19.336424 1625 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:56:19.351369 kernel: audit: type=1131 audit(1734105379.338:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:56:19.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:56:19.339690 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:56:19.339993 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:56:20.291894 update_engine[1195]: I1213 15:56:20.291185 1195 update_attempter.cc:509] Updating boot flags... Dec 13 15:56:21.265280 systemd[1]: Stopped kubelet.service. Dec 13 15:56:21.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.279143 kernel: audit: type=1130 audit(1734105381.264:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.279250 kernel: audit: type=1131 audit(1734105381.266:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.275892 systemd[1]: Starting kubelet.service... Dec 13 15:56:21.306097 systemd[1]: Reloading. Dec 13 15:56:21.452354 /usr/lib/systemd/system-generators/torcx-generator[1673]: time="2024-12-13T15:56:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:56:21.452419 /usr/lib/systemd/system-generators/torcx-generator[1673]: time="2024-12-13T15:56:21Z" level=info msg="torcx already run" Dec 13 15:56:21.573048 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:56:21.573084 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:56:21.601981 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:56:21.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.713773 kernel: audit: type=1400 audit(1734105381.703:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.724032 kernel: audit: type=1400 audit(1734105381.703:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.724123 kernel: audit: type=1400 audit(1734105381.711:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729305 kernel: audit: type=1400 audit(1734105381.711:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.711000 audit: BPF prog-id=46 op=LOAD Dec 13 15:56:21.711000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit: BPF prog-id=47 op=LOAD Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.717000 audit: BPF prog-id=48 op=LOAD Dec 13 15:56:21.717000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:56:21.717000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.722000 audit: BPF prog-id=49 op=LOAD Dec 13 15:56:21.722000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit: BPF prog-id=50 op=LOAD Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.727000 audit: BPF prog-id=51 op=LOAD Dec 13 15:56:21.727000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:56:21.727000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.730000 audit: BPF prog-id=52 op=LOAD Dec 13 15:56:21.730000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit: BPF prog-id=53 op=LOAD Dec 13 15:56:21.731000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit: BPF prog-id=54 op=LOAD Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.731000 audit: BPF prog-id=55 op=LOAD Dec 13 15:56:21.731000 audit: BPF prog-id=34 op=UNLOAD Dec 13 15:56:21.731000 audit: BPF prog-id=35 op=UNLOAD Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.736000 audit: BPF prog-id=56 op=LOAD Dec 13 15:56:21.736000 audit: BPF prog-id=44 op=UNLOAD Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit: BPF prog-id=57 op=LOAD Dec 13 15:56:21.738000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit: BPF prog-id=58 op=LOAD Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.738000 audit: BPF prog-id=59 op=LOAD Dec 13 15:56:21.738000 audit: BPF prog-id=39 op=UNLOAD Dec 13 15:56:21.738000 audit: BPF prog-id=40 op=UNLOAD Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:21.740000 audit: BPF prog-id=60 op=LOAD Dec 13 15:56:21.740000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:56:21.775416 systemd[1]: Started kubelet.service. Dec 13 15:56:21.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.781780 systemd[1]: Stopping kubelet.service... Dec 13 15:56:21.782246 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:56:21.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.783347 systemd[1]: Stopped kubelet.service. Dec 13 15:56:21.787425 systemd[1]: Starting kubelet.service... Dec 13 15:56:21.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:21.965063 systemd[1]: Started kubelet.service. Dec 13 15:56:22.056925 kubelet[1724]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:56:22.056925 kubelet[1724]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:56:22.056925 kubelet[1724]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:56:22.057717 kubelet[1724]: I1213 15:56:22.057022 1724 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:56:22.446838 kubelet[1724]: I1213 15:56:22.446691 1724 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:56:22.447117 kubelet[1724]: I1213 15:56:22.447092 1724 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:56:22.447602 kubelet[1724]: I1213 15:56:22.447576 1724 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:56:22.477630 kubelet[1724]: E1213 15:56:22.477571 1724 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.29.154:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.479233 kubelet[1724]: I1213 15:56:22.479184 1724 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:56:22.501829 kubelet[1724]: I1213 15:56:22.501776 1724 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:56:22.503270 kubelet[1724]: I1213 15:56:22.503220 1724 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:56:22.503549 kubelet[1724]: I1213 15:56:22.503492 1724 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:56:22.504273 kubelet[1724]: I1213 15:56:22.504244 1724 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:56:22.504375 kubelet[1724]: I1213 15:56:22.504277 1724 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:56:22.504504 kubelet[1724]: I1213 15:56:22.504479 1724 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:56:22.504774 kubelet[1724]: I1213 15:56:22.504718 1724 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:56:22.504874 kubelet[1724]: I1213 15:56:22.504782 1724 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:56:22.504874 kubelet[1724]: I1213 15:56:22.504855 1724 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:56:22.505014 kubelet[1724]: I1213 15:56:22.504893 1724 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:56:22.507933 kubelet[1724]: I1213 15:56:22.507895 1724 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:56:22.519696 kubelet[1724]: I1213 15:56:22.519646 1724 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:56:22.520579 kubelet[1724]: W1213 15:56:22.520515 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.230.29.154:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.520771 kubelet[1724]: E1213 15:56:22.520725 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.29.154:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.521015 kubelet[1724]: W1213 15:56:22.520973 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.230.29.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-8d9xb.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.521161 kubelet[1724]: E1213 15:56:22.521136 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.29.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-8d9xb.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.521328 kubelet[1724]: W1213 15:56:22.521296 1724 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:56:22.523339 kubelet[1724]: I1213 15:56:22.523307 1724 server.go:1256] "Started kubelet" Dec 13 15:56:22.523610 kubelet[1724]: I1213 15:56:22.523581 1724 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:56:22.525118 kubelet[1724]: I1213 15:56:22.525091 1724 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:56:22.528275 kubelet[1724]: I1213 15:56:22.528241 1724 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:56:22.528791 kubelet[1724]: I1213 15:56:22.528643 1724 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:56:22.530474 kubelet[1724]: E1213 15:56:22.530441 1724 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.29.154:6443/api/v1/namespaces/default/events\": dial tcp 10.230.29.154:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-8d9xb.gb1.brightbox.com.1810c7a8606465f7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-8d9xb.gb1.brightbox.com,UID:srv-8d9xb.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-8d9xb.gb1.brightbox.com,},FirstTimestamp:2024-12-13 15:56:22.523266551 +0000 UTC m=+0.551554536,LastTimestamp:2024-12-13 15:56:22.523266551 +0000 UTC m=+0.551554536,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-8d9xb.gb1.brightbox.com,}" Dec 13 15:56:22.530000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:22.530000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:22.530000 audit[1724]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000854f00 a1=c0007df968 a2=c000854ed0 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:22.533455 kubelet[1724]: I1213 15:56:22.533289 1724 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:56:22.531000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:22.531000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:22.531000 audit[1724]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00080efa0 a1=c0007df980 a2=c000854f90 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:22.534357 kubelet[1724]: I1213 15:56:22.534321 1724 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:56:22.534742 kubelet[1724]: E1213 15:56:22.534703 1724 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:56:22.534988 kubelet[1724]: I1213 15:56:22.534946 1724 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:56:22.539246 kubelet[1724]: E1213 15:56:22.539198 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-8d9xb.gb1.brightbox.com\" not found" Dec 13 15:56:22.539359 kubelet[1724]: I1213 15:56:22.539276 1724 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:56:22.539446 kubelet[1724]: I1213 15:56:22.539402 1724 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:56:22.539538 kubelet[1724]: I1213 15:56:22.539516 1724 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:56:22.540041 kubelet[1724]: W1213 15:56:22.539991 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.230.29.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.540126 kubelet[1724]: E1213 15:56:22.540049 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.29.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.540849 kubelet[1724]: E1213 15:56:22.540793 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.29.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-8d9xb.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.29.154:6443: connect: connection refused" interval="200ms" Dec 13 15:56:22.541170 kubelet[1724]: I1213 15:56:22.541088 1724 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:56:22.541342 kubelet[1724]: I1213 15:56:22.541313 1724 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:56:22.543254 kubelet[1724]: I1213 15:56:22.543176 1724 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:56:22.545000 audit[1735]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.545000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9d2d0f80 a2=0 a3=7ffd9d2d0f6c items=0 ppid=1724 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:56:22.555000 audit[1737]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.555000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3404ced0 a2=0 a3=7ffd3404cebc items=0 ppid=1724 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:56:22.562000 audit[1741]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.562000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7ffe3060 a2=0 a3=7ffc7ffe304c items=0 ppid=1724 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:56:22.568000 audit[1744]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.568000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdea473370 a2=0 a3=7ffdea47335c items=0 ppid=1724 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:56:22.573460 kubelet[1724]: I1213 15:56:22.573419 1724 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:56:22.573460 kubelet[1724]: I1213 15:56:22.573453 1724 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:56:22.573653 kubelet[1724]: I1213 15:56:22.573489 1724 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:56:22.575222 kubelet[1724]: I1213 15:56:22.575171 1724 policy_none.go:49] "None policy: Start" Dec 13 15:56:22.576092 kubelet[1724]: I1213 15:56:22.576066 1724 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:56:22.576239 kubelet[1724]: I1213 15:56:22.576205 1724 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:56:22.588710 systemd[1]: Created slice kubepods.slice. Dec 13 15:56:22.591000 audit[1747]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.591000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd6a283270 a2=0 a3=7ffd6a28325c items=0 ppid=1724 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:56:22.594722 kubelet[1724]: I1213 15:56:22.594181 1724 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:56:22.596194 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:56:22.594000 audit[1749]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:22.594000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5d5dfa80 a2=0 a3=7ffc5d5dfa6c items=0 ppid=1724 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:56:22.597180 kubelet[1724]: I1213 15:56:22.597144 1724 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:56:22.597273 kubelet[1724]: I1213 15:56:22.597221 1724 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:56:22.597273 kubelet[1724]: I1213 15:56:22.597266 1724 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:56:22.597395 kubelet[1724]: E1213 15:56:22.597342 1724 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:56:22.600000 audit[1750]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.600000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb83d4f40 a2=0 a3=7fffb83d4f2c items=0 ppid=1724 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:56:22.602070 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:56:22.602000 audit[1752]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.602000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff03af1d70 a2=0 a3=7fff03af1d5c items=0 ppid=1724 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:56:22.604972 kubelet[1724]: W1213 15:56:22.604921 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.605134 kubelet[1724]: E1213 15:56:22.605110 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:22.603000 audit[1753]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:22.603000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdecce4210 a2=0 a3=7ffdecce41fc items=0 ppid=1724 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:56:22.605000 audit[1751]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:22.605000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8b04f2b0 a2=0 a3=7ffe8b04f29c items=0 ppid=1724 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:56:22.609037 kubelet[1724]: I1213 15:56:22.609012 1724 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:56:22.607000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:22.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:22.607000 audit[1724]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eab6b0 a1=c000e9f740 a2=c000eab680 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:22.612226 kubelet[1724]: I1213 15:56:22.612187 1724 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:56:22.610000 audit[1754]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:22.610000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcc791fa10 a2=0 a3=7ffcc791f9fc items=0 ppid=1724 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:56:22.613461 kubelet[1724]: I1213 15:56:22.613433 1724 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:56:22.612000 audit[1755]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:22.612000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffefa09a010 a2=0 a3=7ffefa099ffc items=0 ppid=1724 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:22.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:56:22.616653 kubelet[1724]: E1213 15:56:22.616624 1724 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-8d9xb.gb1.brightbox.com\" not found" Dec 13 15:56:22.642599 kubelet[1724]: I1213 15:56:22.642569 1724 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.643355 kubelet[1724]: E1213 15:56:22.643326 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.29.154:6443/api/v1/nodes\": dial tcp 10.230.29.154:6443: connect: connection refused" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.698820 kubelet[1724]: I1213 15:56:22.698590 1724 topology_manager.go:215] "Topology Admit Handler" podUID="354adf5f8c80803d4cf30eb92a0be97a" podNamespace="kube-system" podName="kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.702559 kubelet[1724]: I1213 15:56:22.702533 1724 topology_manager.go:215] "Topology Admit Handler" podUID="4d2b3405d28ec31bcfb07b31b56543ef" podNamespace="kube-system" podName="kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.707377 kubelet[1724]: I1213 15:56:22.706716 1724 topology_manager.go:215] "Topology Admit Handler" podUID="fed27c03d6e6b525ba3123f62eb2013d" podNamespace="kube-system" podName="kube-scheduler-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.720409 systemd[1]: Created slice kubepods-burstable-pod4d2b3405d28ec31bcfb07b31b56543ef.slice. Dec 13 15:56:22.732453 systemd[1]: Created slice kubepods-burstable-pod354adf5f8c80803d4cf30eb92a0be97a.slice. Dec 13 15:56:22.738674 systemd[1]: Created slice kubepods-burstable-podfed27c03d6e6b525ba3123f62eb2013d.slice. Dec 13 15:56:22.741919 kubelet[1724]: E1213 15:56:22.741875 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.29.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-8d9xb.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.29.154:6443: connect: connection refused" interval="400ms" Dec 13 15:56:22.840581 kubelet[1724]: I1213 15:56:22.840509 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fed27c03d6e6b525ba3123f62eb2013d-kubeconfig\") pod \"kube-scheduler-srv-8d9xb.gb1.brightbox.com\" (UID: \"fed27c03d6e6b525ba3123f62eb2013d\") " pod="kube-system/kube-scheduler-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.840976 kubelet[1724]: I1213 15:56:22.840943 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-flexvolume-dir\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.841216 kubelet[1724]: I1213 15:56:22.841163 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-k8s-certs\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.841423 kubelet[1724]: I1213 15:56:22.841391 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-usr-share-ca-certificates\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.841606 kubelet[1724]: I1213 15:56:22.841573 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-ca-certs\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.841807 kubelet[1724]: I1213 15:56:22.841784 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-k8s-certs\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.841997 kubelet[1724]: I1213 15:56:22.841954 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-kubeconfig\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.842265 kubelet[1724]: I1213 15:56:22.842226 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.842453 kubelet[1724]: I1213 15:56:22.842421 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-ca-certs\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.846095 kubelet[1724]: I1213 15:56:22.846061 1724 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.848167 kubelet[1724]: E1213 15:56:22.848143 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.29.154:6443/api/v1/nodes\": dial tcp 10.230.29.154:6443: connect: connection refused" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:22.864631 kubelet[1724]: E1213 15:56:22.864599 1724 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.29.154:6443/api/v1/namespaces/default/events\": dial tcp 10.230.29.154:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-8d9xb.gb1.brightbox.com.1810c7a8606465f7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-8d9xb.gb1.brightbox.com,UID:srv-8d9xb.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-8d9xb.gb1.brightbox.com,},FirstTimestamp:2024-12-13 15:56:22.523266551 +0000 UTC m=+0.551554536,LastTimestamp:2024-12-13 15:56:22.523266551 +0000 UTC m=+0.551554536,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-8d9xb.gb1.brightbox.com,}" Dec 13 15:56:23.031476 env[1203]: time="2024-12-13T15:56:23.031351374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-8d9xb.gb1.brightbox.com,Uid:4d2b3405d28ec31bcfb07b31b56543ef,Namespace:kube-system,Attempt:0,}" Dec 13 15:56:23.037852 env[1203]: time="2024-12-13T15:56:23.037385520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-8d9xb.gb1.brightbox.com,Uid:354adf5f8c80803d4cf30eb92a0be97a,Namespace:kube-system,Attempt:0,}" Dec 13 15:56:23.043265 env[1203]: time="2024-12-13T15:56:23.043226220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-8d9xb.gb1.brightbox.com,Uid:fed27c03d6e6b525ba3123f62eb2013d,Namespace:kube-system,Attempt:0,}" Dec 13 15:56:23.142821 kubelet[1724]: E1213 15:56:23.142720 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.29.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-8d9xb.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.29.154:6443: connect: connection refused" interval="800ms" Dec 13 15:56:23.251727 kubelet[1724]: I1213 15:56:23.251685 1724 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:23.252261 kubelet[1724]: E1213 15:56:23.252229 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.29.154:6443/api/v1/nodes\": dial tcp 10.230.29.154:6443: connect: connection refused" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:23.594374 kubelet[1724]: W1213 15:56:23.594290 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.230.29.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.594374 kubelet[1724]: E1213 15:56:23.594376 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.29.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.616380 kubelet[1724]: W1213 15:56:23.616309 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.230.29.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-8d9xb.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.616380 kubelet[1724]: E1213 15:56:23.616377 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.29.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-8d9xb.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.653044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4029914091.mount: Deactivated successfully. Dec 13 15:56:23.661326 env[1203]: time="2024-12-13T15:56:23.661275637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.662623 env[1203]: time="2024-12-13T15:56:23.662587141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.664161 env[1203]: time="2024-12-13T15:56:23.664126036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.668919 env[1203]: time="2024-12-13T15:56:23.668874850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.674613 kubelet[1724]: W1213 15:56:23.674532 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.674755 kubelet[1724]: E1213 15:56:23.674620 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.676025 env[1203]: time="2024-12-13T15:56:23.675987680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.680542 env[1203]: time="2024-12-13T15:56:23.680490601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.685700 env[1203]: time="2024-12-13T15:56:23.685664828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.686843 env[1203]: time="2024-12-13T15:56:23.686809975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.687954 env[1203]: time="2024-12-13T15:56:23.687919999Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.689013 env[1203]: time="2024-12-13T15:56:23.688980003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.690059 env[1203]: time="2024-12-13T15:56:23.690024236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.691157 env[1203]: time="2024-12-13T15:56:23.691122882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:23.700470 kubelet[1724]: W1213 15:56:23.700395 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.230.29.154:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.700594 kubelet[1724]: E1213 15:56:23.700476 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.29.154:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:23.727004 env[1203]: time="2024-12-13T15:56:23.726885984Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:23.727247 env[1203]: time="2024-12-13T15:56:23.727023184Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:23.727247 env[1203]: time="2024-12-13T15:56:23.727094458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:23.727611 env[1203]: time="2024-12-13T15:56:23.727546164Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e62b1511f6fbc4f596688bb11419ed3cdb67e8d0a15aada9263457344d1f29dc pid=1767 runtime=io.containerd.runc.v2 Dec 13 15:56:23.731846 env[1203]: time="2024-12-13T15:56:23.731497881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:23.731846 env[1203]: time="2024-12-13T15:56:23.731543186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:23.731846 env[1203]: time="2024-12-13T15:56:23.731575878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:23.732533 env[1203]: time="2024-12-13T15:56:23.732463661Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad21c2395fe0e0816112e3b42a27efac7d168165c21653b23325c515c7610374 pid=1779 runtime=io.containerd.runc.v2 Dec 13 15:56:23.734431 env[1203]: time="2024-12-13T15:56:23.734327242Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:23.734532 env[1203]: time="2024-12-13T15:56:23.734471091Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:23.734599 env[1203]: time="2024-12-13T15:56:23.734554724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:23.735281 env[1203]: time="2024-12-13T15:56:23.735160986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d64069f852beea1b0d2edbf6cca00dc3fe55502640bcd20e868bf18224e92370 pid=1778 runtime=io.containerd.runc.v2 Dec 13 15:56:23.774777 systemd[1]: Started cri-containerd-ad21c2395fe0e0816112e3b42a27efac7d168165c21653b23325c515c7610374.scope. Dec 13 15:56:23.778098 systemd[1]: Started cri-containerd-d64069f852beea1b0d2edbf6cca00dc3fe55502640bcd20e868bf18224e92370.scope. Dec 13 15:56:23.801390 systemd[1]: Started cri-containerd-e62b1511f6fbc4f596688bb11419ed3cdb67e8d0a15aada9263457344d1f29dc.scope. Dec 13 15:56:23.839208 kernel: kauditd_printk_skb: 219 callbacks suppressed Dec 13 15:56:23.839431 kernel: audit: type=1400 audit(1734105383.827:467): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.856664 kernel: audit: type=1400 audit(1734105383.827:468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.862846 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:56:23.862929 kernel: audit: type=1400 audit(1734105383.827:469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.862974 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:56:23.863028 kernel: audit: type=1400 audit(1734105383.827:470): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.863102 kernel: audit: backlog limit exceeded Dec 13 15:56:23.863161 kernel: audit: type=1400 audit(1734105383.827:471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.870975 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:56:23.871064 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.828000 audit: BPF prog-id=61 op=LOAD Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326231353131663666626334663539363638386262313134313965 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326231353131663666626334663539363638386262313134313965 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.839000 audit: BPF prog-id=62 op=LOAD Dec 13 15:56:23.839000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00023cfc0 items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326231353131663666626334663539363638386262313134313965 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit: BPF prog-id=63 op=LOAD Dec 13 15:56:23.840000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00023d008 items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326231353131663666626334663539363638386262313134313965 Dec 13 15:56:23.840000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:56:23.840000 audit: BPF prog-id=62 op=UNLOAD Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit: BPF prog-id=64 op=LOAD Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.840000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00023d418 items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326231353131663666626334663539363638386262313134313965 Dec 13 15:56:23.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1778 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436343036396638353262656561316230643265646266366363613030 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1778 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436343036396638353262656561316230643265646266366363613030 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit: BPF prog-id=66 op=LOAD Dec 13 15:56:23.877000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000feba0 items=0 ppid=1778 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436343036396638353262656561316230643265646266366363613030 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.877000 audit: BPF prog-id=67 op=LOAD Dec 13 15:56:23.877000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000febe8 items=0 ppid=1778 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436343036396638353262656561316230643265646266366363613030 Dec 13 15:56:23.877000 audit: BPF prog-id=67 op=UNLOAD Dec 13 15:56:23.877000 audit: BPF prog-id=66 op=UNLOAD Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.878000 audit: BPF prog-id=68 op=LOAD Dec 13 15:56:23.878000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000feff8 items=0 ppid=1778 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436343036396638353262656561316230643265646266366363613030 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.885000 audit: BPF prog-id=69 op=LOAD Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1779 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164323163323339356665306530383136313132653362343261323765 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1779 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164323163323339356665306530383136313132653362343261323765 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit: BPF prog-id=70 op=LOAD Dec 13 15:56:23.886000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024af0 items=0 ppid=1779 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164323163323339356665306530383136313132653362343261323765 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit: BPF prog-id=71 op=LOAD Dec 13 15:56:23.886000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024b38 items=0 ppid=1779 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164323163323339356665306530383136313132653362343261323765 Dec 13 15:56:23.886000 audit: BPF prog-id=71 op=UNLOAD Dec 13 15:56:23.886000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:23.886000 audit: BPF prog-id=72 op=LOAD Dec 13 15:56:23.886000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024f48 items=0 ppid=1779 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:23.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164323163323339356665306530383136313132653362343261323765 Dec 13 15:56:23.943653 kubelet[1724]: E1213 15:56:23.943588 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.29.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-8d9xb.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.29.154:6443: connect: connection refused" interval="1.6s" Dec 13 15:56:23.944009 env[1203]: time="2024-12-13T15:56:23.943940511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-8d9xb.gb1.brightbox.com,Uid:fed27c03d6e6b525ba3123f62eb2013d,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad21c2395fe0e0816112e3b42a27efac7d168165c21653b23325c515c7610374\"" Dec 13 15:56:23.956345 env[1203]: time="2024-12-13T15:56:23.956287639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-8d9xb.gb1.brightbox.com,Uid:354adf5f8c80803d4cf30eb92a0be97a,Namespace:kube-system,Attempt:0,} returns sandbox id \"e62b1511f6fbc4f596688bb11419ed3cdb67e8d0a15aada9263457344d1f29dc\"" Dec 13 15:56:23.962555 env[1203]: time="2024-12-13T15:56:23.961168448Z" level=info msg="CreateContainer within sandbox \"ad21c2395fe0e0816112e3b42a27efac7d168165c21653b23325c515c7610374\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 15:56:23.964329 env[1203]: time="2024-12-13T15:56:23.964289540Z" level=info msg="CreateContainer within sandbox \"e62b1511f6fbc4f596688bb11419ed3cdb67e8d0a15aada9263457344d1f29dc\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 15:56:23.981253 env[1203]: time="2024-12-13T15:56:23.980942331Z" level=info msg="CreateContainer within sandbox \"ad21c2395fe0e0816112e3b42a27efac7d168165c21653b23325c515c7610374\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"af3c411e7f90eae268d5fcd1a9086b7cde4f09049257b3f0d04310071502f4ea\"" Dec 13 15:56:23.982523 env[1203]: time="2024-12-13T15:56:23.982487577Z" level=info msg="StartContainer for \"af3c411e7f90eae268d5fcd1a9086b7cde4f09049257b3f0d04310071502f4ea\"" Dec 13 15:56:23.984057 env[1203]: time="2024-12-13T15:56:23.984007885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-8d9xb.gb1.brightbox.com,Uid:4d2b3405d28ec31bcfb07b31b56543ef,Namespace:kube-system,Attempt:0,} returns sandbox id \"d64069f852beea1b0d2edbf6cca00dc3fe55502640bcd20e868bf18224e92370\"" Dec 13 15:56:23.988802 env[1203]: time="2024-12-13T15:56:23.988761150Z" level=info msg="CreateContainer within sandbox \"d64069f852beea1b0d2edbf6cca00dc3fe55502640bcd20e868bf18224e92370\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 15:56:24.000159 env[1203]: time="2024-12-13T15:56:24.000082962Z" level=info msg="CreateContainer within sandbox \"e62b1511f6fbc4f596688bb11419ed3cdb67e8d0a15aada9263457344d1f29dc\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"541f9cb410e8889dfcf743b9f4d6539fea3f9a3c2ff178271856b912738b764f\"" Dec 13 15:56:24.001235 env[1203]: time="2024-12-13T15:56:24.001199279Z" level=info msg="StartContainer for \"541f9cb410e8889dfcf743b9f4d6539fea3f9a3c2ff178271856b912738b764f\"" Dec 13 15:56:24.010691 env[1203]: time="2024-12-13T15:56:24.010614316Z" level=info msg="CreateContainer within sandbox \"d64069f852beea1b0d2edbf6cca00dc3fe55502640bcd20e868bf18224e92370\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"822c1be5276ae7cdc8c6f6f1cbe753488016b5e913a881ef79b7a222b6b326b8\"" Dec 13 15:56:24.011554 env[1203]: time="2024-12-13T15:56:24.011518137Z" level=info msg="StartContainer for \"822c1be5276ae7cdc8c6f6f1cbe753488016b5e913a881ef79b7a222b6b326b8\"" Dec 13 15:56:24.023312 systemd[1]: Started cri-containerd-af3c411e7f90eae268d5fcd1a9086b7cde4f09049257b3f0d04310071502f4ea.scope. Dec 13 15:56:24.057584 systemd[1]: Started cri-containerd-541f9cb410e8889dfcf743b9f4d6539fea3f9a3c2ff178271856b912738b764f.scope. Dec 13 15:56:24.063791 systemd[1]: Started cri-containerd-822c1be5276ae7cdc8c6f6f1cbe753488016b5e913a881ef79b7a222b6b326b8.scope. Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.068000 audit: BPF prog-id=73 op=LOAD Dec 13 15:56:24.069000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.069000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336334313165376639306561653236386435666364316139303836 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336334313165376639306561653236386435666364316139303836 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit: BPF prog-id=74 op=LOAD Dec 13 15:56:24.072000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0004030e0 items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336334313165376639306561653236386435666364316139303836 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit: BPF prog-id=75 op=LOAD Dec 13 15:56:24.072000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000403128 items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336334313165376639306561653236386435666364316139303836 Dec 13 15:56:24.072000 audit: BPF prog-id=75 op=UNLOAD Dec 13 15:56:24.072000 audit: BPF prog-id=74 op=UNLOAD Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.072000 audit: BPF prog-id=76 op=LOAD Dec 13 15:56:24.072000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000403538 items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336334313165376639306561653236386435666364316139303836 Dec 13 15:56:24.079258 kubelet[1724]: I1213 15:56:24.078450 1724 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:24.079258 kubelet[1724]: E1213 15:56:24.079228 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.29.154:6443/api/v1/nodes\": dial tcp 10.230.29.154:6443: connect: connection refused" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.105000 audit: BPF prog-id=77 op=LOAD Dec 13 15:56:24.110000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.110000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1767 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316639636234313065383838396466636637343362396634643635 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1767 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316639636234313065383838396466636637343362396634643635 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit: BPF prog-id=78 op=LOAD Dec 13 15:56:24.111000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021d790 items=0 ppid=1767 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316639636234313065383838396466636637343362396634643635 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.111000 audit: BPF prog-id=79 op=LOAD Dec 13 15:56:24.111000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021d7d8 items=0 ppid=1767 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316639636234313065383838396466636637343362396634643635 Dec 13 15:56:24.112000 audit: BPF prog-id=79 op=UNLOAD Dec 13 15:56:24.112000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { perfmon } for pid=1907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit[1907]: AVC avc: denied { bpf } for pid=1907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.112000 audit: BPF prog-id=80 op=LOAD Dec 13 15:56:24.112000 audit[1907]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021dbe8 items=0 ppid=1767 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534316639636234313065383838396466636637343362396634643635 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.114000 audit: BPF prog-id=81 op=LOAD Dec 13 15:56:24.115000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.115000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1778 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326331626535323736616537636463386336663666316362653735 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1778 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326331626535323736616537636463386336663666316362653735 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.120000 audit: BPF prog-id=82 op=LOAD Dec 13 15:56:24.120000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001addb0 items=0 ppid=1778 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326331626535323736616537636463386336663666316362653735 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.121000 audit: BPF prog-id=83 op=LOAD Dec 13 15:56:24.121000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001addf8 items=0 ppid=1778 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326331626535323736616537636463386336663666316362653735 Dec 13 15:56:24.122000 audit: BPF prog-id=83 op=UNLOAD Dec 13 15:56:24.122000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:24.123000 audit: BPF prog-id=84 op=LOAD Dec 13 15:56:24.123000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001f8208 items=0 ppid=1778 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:24.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326331626535323736616537636463386336663666316362653735 Dec 13 15:56:24.172676 env[1203]: time="2024-12-13T15:56:24.172609787Z" level=info msg="StartContainer for \"af3c411e7f90eae268d5fcd1a9086b7cde4f09049257b3f0d04310071502f4ea\" returns successfully" Dec 13 15:56:24.199123 env[1203]: time="2024-12-13T15:56:24.198916828Z" level=info msg="StartContainer for \"822c1be5276ae7cdc8c6f6f1cbe753488016b5e913a881ef79b7a222b6b326b8\" returns successfully" Dec 13 15:56:24.210233 env[1203]: time="2024-12-13T15:56:24.210107872Z" level=info msg="StartContainer for \"541f9cb410e8889dfcf743b9f4d6539fea3f9a3c2ff178271856b912738b764f\" returns successfully" Dec 13 15:56:24.520647 kubelet[1724]: E1213 15:56:24.520602 1724 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.29.154:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:25.494971 kubelet[1724]: W1213 15:56:25.494916 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:25.494971 kubelet[1724]: E1213 15:56:25.494975 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.29.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.29.154:6443: connect: connection refused Dec 13 15:56:25.682189 kubelet[1724]: I1213 15:56:25.682133 1724 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:26.577000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:26.577000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bb5920 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:26.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:26.577000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:26.577000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004dc840 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:26.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:27.145000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.145000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0061e5b60 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.145000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.145000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004750c20 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.146000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.146000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0061e5da0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.146000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.149000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.149000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0061e5f80 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.154000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.154000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004750f60 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.154000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.154000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:27.154000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0063ea540 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:56:27.154000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:56:27.321125 kubelet[1724]: E1213 15:56:27.321060 1724 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-8d9xb.gb1.brightbox.com\" not found" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:27.363846 kubelet[1724]: I1213 15:56:27.363781 1724 kubelet_node_status.go:76] "Successfully registered node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:27.509567 kubelet[1724]: I1213 15:56:27.509530 1724 apiserver.go:52] "Watching apiserver" Dec 13 15:56:27.540365 kubelet[1724]: I1213 15:56:27.540314 1724 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:56:29.416710 kubelet[1724]: W1213 15:56:29.416662 1724 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:56:29.961181 kubelet[1724]: W1213 15:56:29.961140 1724 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:56:30.155254 systemd[1]: Reloading. Dec 13 15:56:30.257855 /usr/lib/systemd/system-generators/torcx-generator[2013]: time="2024-12-13T15:56:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:56:30.257901 /usr/lib/systemd/system-generators/torcx-generator[2013]: time="2024-12-13T15:56:30Z" level=info msg="torcx already run" Dec 13 15:56:30.373022 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:56:30.373072 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:56:30.402917 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:56:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.535756 kernel: kauditd_printk_skb: 360 callbacks suppressed Dec 13 15:56:30.535864 kernel: audit: type=1400 audit(1734105390.530:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557766 kernel: audit: type=1400 audit(1734105390.530:582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557847 kernel: audit: type=1400 audit(1734105390.541:583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.562432 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:56:30.562522 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:56:30.562586 kernel: audit: backlog limit exceeded Dec 13 15:56:30.567978 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:56:30.568078 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:56:30.568130 kernel: audit: backlog limit exceeded Dec 13 15:56:30.569115 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.541000 audit: BPF prog-id=85 op=LOAD Dec 13 15:56:30.541000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit: BPF prog-id=86 op=LOAD Dec 13 15:56:30.543000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.543000 audit: BPF prog-id=87 op=LOAD Dec 13 15:56:30.543000 audit: BPF prog-id=65 op=UNLOAD Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit: BPF prog-id=88 op=LOAD Dec 13 15:56:30.558000 audit: BPF prog-id=46 op=UNLOAD Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit: BPF prog-id=89 op=LOAD Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.558000 audit: BPF prog-id=90 op=LOAD Dec 13 15:56:30.558000 audit: BPF prog-id=47 op=UNLOAD Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.570000 audit: BPF prog-id=91 op=LOAD Dec 13 15:56:30.570000 audit: BPF prog-id=49 op=UNLOAD Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit: BPF prog-id=92 op=LOAD Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.571000 audit: BPF prog-id=93 op=LOAD Dec 13 15:56:30.571000 audit: BPF prog-id=50 op=UNLOAD Dec 13 15:56:30.571000 audit: BPF prog-id=51 op=UNLOAD Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.574000 audit: BPF prog-id=94 op=LOAD Dec 13 15:56:30.574000 audit: BPF prog-id=52 op=UNLOAD Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit: BPF prog-id=95 op=LOAD Dec 13 15:56:30.576000 audit: BPF prog-id=53 op=UNLOAD Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit: BPF prog-id=96 op=LOAD Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.576000 audit: BPF prog-id=97 op=LOAD Dec 13 15:56:30.576000 audit: BPF prog-id=54 op=UNLOAD Dec 13 15:56:30.576000 audit: BPF prog-id=55 op=UNLOAD Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.577000 audit: BPF prog-id=98 op=LOAD Dec 13 15:56:30.577000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.580000 audit: BPF prog-id=99 op=LOAD Dec 13 15:56:30.580000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit: BPF prog-id=100 op=LOAD Dec 13 15:56:30.582000 audit: BPF prog-id=56 op=UNLOAD Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.583000 audit: BPF prog-id=101 op=LOAD Dec 13 15:56:30.583000 audit: BPF prog-id=61 op=UNLOAD Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit: BPF prog-id=102 op=LOAD Dec 13 15:56:30.585000 audit: BPF prog-id=57 op=UNLOAD Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit: BPF prog-id=103 op=LOAD Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.585000 audit: BPF prog-id=104 op=LOAD Dec 13 15:56:30.585000 audit: BPF prog-id=58 op=UNLOAD Dec 13 15:56:30.585000 audit: BPF prog-id=59 op=UNLOAD Dec 13 15:56:30.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:30.587000 audit: BPF prog-id=105 op=LOAD Dec 13 15:56:30.587000 audit: BPF prog-id=60 op=UNLOAD Dec 13 15:56:30.613969 systemd[1]: Stopping kubelet.service... Dec 13 15:56:30.616423 kubelet[1724]: I1213 15:56:30.613552 1724 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:56:30.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:30.635393 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:56:30.635681 systemd[1]: Stopped kubelet.service. Dec 13 15:56:30.636213 systemd[1]: kubelet.service: Consumed 1.040s CPU time. Dec 13 15:56:30.640213 systemd[1]: Starting kubelet.service... Dec 13 15:56:30.926000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:30.926000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e8fc40 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:30.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:30.927000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:30.927000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e44040 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:30.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:30.927000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:30.927000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e44080 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:30.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:30.927000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:30.927000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e8fcc0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:30.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:31.798304 systemd[1]: Started kubelet.service. Dec 13 15:56:31.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:31.918342 kubelet[2064]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:56:31.918342 kubelet[2064]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:56:31.918342 kubelet[2064]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:56:31.918342 kubelet[2064]: I1213 15:56:31.918250 2064 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:56:31.925562 kubelet[2064]: I1213 15:56:31.924609 2064 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:56:31.925562 kubelet[2064]: I1213 15:56:31.924640 2064 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:56:31.925562 kubelet[2064]: I1213 15:56:31.924864 2064 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:56:31.929196 kubelet[2064]: I1213 15:56:31.928829 2064 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 15:56:31.953473 kubelet[2064]: I1213 15:56:31.952629 2064 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:56:31.971845 kubelet[2064]: I1213 15:56:31.971787 2064 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:56:31.972767 kubelet[2064]: I1213 15:56:31.972234 2064 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:56:31.972767 kubelet[2064]: I1213 15:56:31.972468 2064 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:56:31.972767 kubelet[2064]: I1213 15:56:31.972559 2064 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:56:31.972767 kubelet[2064]: I1213 15:56:31.972579 2064 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:56:31.972767 kubelet[2064]: I1213 15:56:31.972651 2064 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:56:31.973217 kubelet[2064]: I1213 15:56:31.972899 2064 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:56:31.974304 kubelet[2064]: I1213 15:56:31.973815 2064 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:56:31.974304 kubelet[2064]: I1213 15:56:31.973899 2064 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:56:31.977118 kubelet[2064]: I1213 15:56:31.977077 2064 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:56:31.988284 kubelet[2064]: I1213 15:56:31.987280 2064 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:56:31.990486 kubelet[2064]: I1213 15:56:31.990459 2064 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:56:31.991924 kubelet[2064]: I1213 15:56:31.991899 2064 server.go:1256] "Started kubelet" Dec 13 15:56:32.001000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:32.001000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:32.001000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00086c480 a1=c0008d6378 a2=c00086c450 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:32.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:32.001000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:32.001000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:32.001000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000828540 a1=c0008d6390 a2=c00086c510 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:32.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:32.005389 kubelet[2064]: I1213 15:56:32.002482 2064 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:56:32.005389 kubelet[2064]: I1213 15:56:32.002575 2064 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:56:32.005389 kubelet[2064]: I1213 15:56:32.002642 2064 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:56:32.009287 kubelet[2064]: I1213 15:56:32.009260 2064 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:56:32.010444 kubelet[2064]: I1213 15:56:32.010239 2064 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:56:32.011683 kubelet[2064]: I1213 15:56:32.010690 2064 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:56:32.019058 kubelet[2064]: I1213 15:56:32.019027 2064 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:56:32.019645 kubelet[2064]: I1213 15:56:32.019616 2064 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:56:32.022511 kubelet[2064]: I1213 15:56:32.022486 2064 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:56:32.026889 kubelet[2064]: I1213 15:56:32.026862 2064 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:56:32.035444 kubelet[2064]: E1213 15:56:32.034375 2064 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:56:32.038924 kubelet[2064]: I1213 15:56:32.038896 2064 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:56:32.039073 kubelet[2064]: I1213 15:56:32.039049 2064 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:56:32.039353 kubelet[2064]: I1213 15:56:32.039311 2064 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:56:32.054824 kubelet[2064]: I1213 15:56:32.054690 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:56:32.067708 kubelet[2064]: I1213 15:56:32.067678 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:56:32.067958 kubelet[2064]: I1213 15:56:32.067932 2064 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:56:32.068118 kubelet[2064]: I1213 15:56:32.068093 2064 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:56:32.073305 kubelet[2064]: E1213 15:56:32.071356 2064 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:56:32.131506 kubelet[2064]: I1213 15:56:32.131230 2064 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:56:32.131506 kubelet[2064]: I1213 15:56:32.131265 2064 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:56:32.131506 kubelet[2064]: I1213 15:56:32.131298 2064 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:56:32.131804 kubelet[2064]: I1213 15:56:32.131607 2064 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 15:56:32.131804 kubelet[2064]: I1213 15:56:32.131652 2064 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 15:56:32.131804 kubelet[2064]: I1213 15:56:32.131677 2064 policy_none.go:49] "None policy: Start" Dec 13 15:56:32.132851 kubelet[2064]: I1213 15:56:32.132819 2064 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:56:32.132937 kubelet[2064]: I1213 15:56:32.132867 2064 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:56:32.133199 kubelet[2064]: I1213 15:56:32.133170 2064 state_mem.go:75] "Updated machine memory state" Dec 13 15:56:32.142253 kubelet[2064]: I1213 15:56:32.141898 2064 kubelet_node_status.go:73] "Attempting to register node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.154092 kubelet[2064]: I1213 15:56:32.153835 2064 kubelet_node_status.go:112] "Node was previously registered" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.154092 kubelet[2064]: I1213 15:56:32.153955 2064 kubelet_node_status.go:76] "Successfully registered node" node="srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.163867 kubelet[2064]: I1213 15:56:32.163839 2064 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:56:32.164135 kubelet[2064]: I1213 15:56:32.164107 2064 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:56:32.163000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:32.163000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:56:32.163000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00086cb70 a1=c000fd7308 a2=c00086cb40 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:32.163000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:56:32.165145 kubelet[2064]: I1213 15:56:32.165115 2064 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:56:32.174661 kubelet[2064]: I1213 15:56:32.174631 2064 topology_manager.go:215] "Topology Admit Handler" podUID="4d2b3405d28ec31bcfb07b31b56543ef" podNamespace="kube-system" podName="kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.175893 kubelet[2064]: I1213 15:56:32.174867 2064 topology_manager.go:215] "Topology Admit Handler" podUID="fed27c03d6e6b525ba3123f62eb2013d" podNamespace="kube-system" podName="kube-scheduler-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.175893 kubelet[2064]: I1213 15:56:32.174964 2064 topology_manager.go:215] "Topology Admit Handler" podUID="354adf5f8c80803d4cf30eb92a0be97a" podNamespace="kube-system" podName="kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.201381 kubelet[2064]: W1213 15:56:32.200981 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:56:32.201381 kubelet[2064]: E1213 15:56:32.201075 2064 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.201381 kubelet[2064]: W1213 15:56:32.201212 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:56:32.201381 kubelet[2064]: W1213 15:56:32.201387 2064 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:56:32.201720 kubelet[2064]: E1213 15:56:32.201435 2064 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" already exists" pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.225050 kubelet[2064]: I1213 15:56:32.223920 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-flexvolume-dir\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.225050 kubelet[2064]: I1213 15:56:32.223988 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.225050 kubelet[2064]: I1213 15:56:32.224072 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-ca-certs\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.225050 kubelet[2064]: I1213 15:56:32.224106 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-k8s-certs\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.225050 kubelet[2064]: I1213 15:56:32.224139 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4d2b3405d28ec31bcfb07b31b56543ef-kubeconfig\") pod \"kube-controller-manager-srv-8d9xb.gb1.brightbox.com\" (UID: \"4d2b3405d28ec31bcfb07b31b56543ef\") " pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.226503 kubelet[2064]: I1213 15:56:32.224170 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fed27c03d6e6b525ba3123f62eb2013d-kubeconfig\") pod \"kube-scheduler-srv-8d9xb.gb1.brightbox.com\" (UID: \"fed27c03d6e6b525ba3123f62eb2013d\") " pod="kube-system/kube-scheduler-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.226503 kubelet[2064]: I1213 15:56:32.224220 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-ca-certs\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.226503 kubelet[2064]: I1213 15:56:32.224259 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-k8s-certs\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.226503 kubelet[2064]: I1213 15:56:32.224296 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/354adf5f8c80803d4cf30eb92a0be97a-usr-share-ca-certificates\") pod \"kube-apiserver-srv-8d9xb.gb1.brightbox.com\" (UID: \"354adf5f8c80803d4cf30eb92a0be97a\") " pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" Dec 13 15:56:32.978578 kubelet[2064]: I1213 15:56:32.978515 2064 apiserver.go:52] "Watching apiserver" Dec 13 15:56:33.020227 kubelet[2064]: I1213 15:56:33.020146 2064 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:56:33.201899 kubelet[2064]: I1213 15:56:33.201849 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-8d9xb.gb1.brightbox.com" podStartSLOduration=4.201726249 podStartE2EDuration="4.201726249s" podCreationTimestamp="2024-12-13 15:56:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:56:33.154012587 +0000 UTC m=+1.335283165" watchObservedRunningTime="2024-12-13 15:56:33.201726249 +0000 UTC m=+1.382996807" Dec 13 15:56:33.277013 kubelet[2064]: I1213 15:56:33.276851 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-8d9xb.gb1.brightbox.com" podStartSLOduration=4.276773172 podStartE2EDuration="4.276773172s" podCreationTimestamp="2024-12-13 15:56:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:56:33.261300587 +0000 UTC m=+1.442571156" watchObservedRunningTime="2024-12-13 15:56:33.276773172 +0000 UTC m=+1.458043748" Dec 13 15:56:33.277251 kubelet[2064]: I1213 15:56:33.277005 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-8d9xb.gb1.brightbox.com" podStartSLOduration=1.276954325 podStartE2EDuration="1.276954325s" podCreationTimestamp="2024-12-13 15:56:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:56:33.204279563 +0000 UTC m=+1.385550132" watchObservedRunningTime="2024-12-13 15:56:33.276954325 +0000 UTC m=+1.458224903" Dec 13 15:56:37.678400 sudo[1363]: pam_unix(sudo:session): session closed for user root Dec 13 15:56:37.678000 audit[1363]: USER_END pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:56:37.683573 kernel: kauditd_printk_skb: 266 callbacks suppressed Dec 13 15:56:37.683686 kernel: audit: type=1106 audit(1734105397.678:831): pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:56:37.681000 audit[1363]: CRED_DISP pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:56:37.695384 kernel: audit: type=1104 audit(1734105397.681:832): pid=1363 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:56:37.831363 sshd[1360]: pam_unix(sshd:session): session closed for user core Dec 13 15:56:37.832000 audit[1360]: USER_END pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:56:37.837075 systemd[1]: sshd@6-10.230.29.154:22-139.178.68.195:54398.service: Deactivated successfully. Dec 13 15:56:37.838381 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:56:37.838609 systemd[1]: session-7.scope: Consumed 5.812s CPU time. Dec 13 15:56:37.844701 kernel: audit: type=1106 audit(1734105397.832:833): pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:56:37.844836 kernel: audit: type=1104 audit(1734105397.833:834): pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:56:37.833000 audit[1360]: CRED_DISP pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:56:37.845588 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:56:37.847903 systemd-logind[1190]: Removed session 7. Dec 13 15:56:37.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.29.154:22-139.178.68.195:54398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:37.857821 kernel: audit: type=1131 audit(1734105397.834:835): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.29.154:22-139.178.68.195:54398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:43.431000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526954 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 15:56:43.431000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bbe1c0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:43.449462 kernel: audit: type=1400 audit(1734105403.431:836): avc: denied { watch } for pid=1941 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526954 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 15:56:43.449604 kernel: audit: type=1300 audit(1734105403.431:836): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bbe1c0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:56:43.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:43.461763 kernel: audit: type=1327 audit(1734105403.431:836): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:43.582643 kubelet[2064]: I1213 15:56:43.582585 2064 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 15:56:43.583959 env[1203]: time="2024-12-13T15:56:43.583909075Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:56:43.585029 kubelet[2064]: I1213 15:56:43.584982 2064 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 15:56:44.609223 kubelet[2064]: I1213 15:56:44.609162 2064 topology_manager.go:215] "Topology Admit Handler" podUID="349ac834-9a30-4bf8-a21a-1e35f4fb7130" podNamespace="kube-system" podName="kube-proxy-r67kq" Dec 13 15:56:44.617447 kubelet[2064]: W1213 15:56:44.617288 2064 reflector.go:539] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:56:44.617447 kubelet[2064]: E1213 15:56:44.617360 2064 reflector.go:147] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:56:44.617704 kubelet[2064]: W1213 15:56:44.617459 2064 reflector.go:539] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:56:44.617704 kubelet[2064]: E1213 15:56:44.617483 2064 reflector.go:147] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:56:44.624581 systemd[1]: Created slice kubepods-besteffort-pod349ac834_9a30_4bf8_a21a_1e35f4fb7130.slice. Dec 13 15:56:44.695573 kubelet[2064]: I1213 15:56:44.695488 2064 topology_manager.go:215] "Topology Admit Handler" podUID="c29ea826-51c1-4a2a-a215-96a877710b46" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-22glv" Dec 13 15:56:44.704435 systemd[1]: Created slice kubepods-besteffort-podc29ea826_51c1_4a2a_a215_96a877710b46.slice. Dec 13 15:56:44.707889 kubelet[2064]: I1213 15:56:44.707856 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrjl2\" (UniqueName: \"kubernetes.io/projected/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-api-access-wrjl2\") pod \"kube-proxy-r67kq\" (UID: \"349ac834-9a30-4bf8-a21a-1e35f4fb7130\") " pod="kube-system/kube-proxy-r67kq" Dec 13 15:56:44.708196 kubelet[2064]: I1213 15:56:44.708167 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c29ea826-51c1-4a2a-a215-96a877710b46-var-lib-calico\") pod \"tigera-operator-c7ccbd65-22glv\" (UID: \"c29ea826-51c1-4a2a-a215-96a877710b46\") " pod="tigera-operator/tigera-operator-c7ccbd65-22glv" Dec 13 15:56:44.708468 kubelet[2064]: I1213 15:56:44.708429 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/349ac834-9a30-4bf8-a21a-1e35f4fb7130-xtables-lock\") pod \"kube-proxy-r67kq\" (UID: \"349ac834-9a30-4bf8-a21a-1e35f4fb7130\") " pod="kube-system/kube-proxy-r67kq" Dec 13 15:56:44.708635 kubelet[2064]: I1213 15:56:44.708596 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/349ac834-9a30-4bf8-a21a-1e35f4fb7130-lib-modules\") pod \"kube-proxy-r67kq\" (UID: \"349ac834-9a30-4bf8-a21a-1e35f4fb7130\") " pod="kube-system/kube-proxy-r67kq" Dec 13 15:56:44.708872 kubelet[2064]: I1213 15:56:44.708847 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jmtxj\" (UniqueName: \"kubernetes.io/projected/c29ea826-51c1-4a2a-a215-96a877710b46-kube-api-access-jmtxj\") pod \"tigera-operator-c7ccbd65-22glv\" (UID: \"c29ea826-51c1-4a2a-a215-96a877710b46\") " pod="tigera-operator/tigera-operator-c7ccbd65-22glv" Dec 13 15:56:44.709028 kubelet[2064]: I1213 15:56:44.709003 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-proxy\") pod \"kube-proxy-r67kq\" (UID: \"349ac834-9a30-4bf8-a21a-1e35f4fb7130\") " pod="kube-system/kube-proxy-r67kq" Dec 13 15:56:45.015762 env[1203]: time="2024-12-13T15:56:45.015583199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-22glv,Uid:c29ea826-51c1-4a2a-a215-96a877710b46,Namespace:tigera-operator,Attempt:0,}" Dec 13 15:56:45.043875 env[1203]: time="2024-12-13T15:56:45.043536540Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:45.043875 env[1203]: time="2024-12-13T15:56:45.043603463Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:45.043875 env[1203]: time="2024-12-13T15:56:45.043621237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:45.044476 env[1203]: time="2024-12-13T15:56:45.044383156Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7 pid=2151 runtime=io.containerd.runc.v2 Dec 13 15:56:45.086837 systemd[1]: Started cri-containerd-7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7.scope. Dec 13 15:56:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.122770 kernel: audit: type=1400 audit(1734105405.108:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.122865 kernel: audit: type=1400 audit(1734105405.108:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.122925 kernel: audit: type=1400 audit(1734105405.109:839): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.127783 kernel: audit: type=1400 audit(1734105405.109:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132823 kernel: audit: type=1400 audit(1734105405.109:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.142859 kernel: audit: type=1400 audit(1734105405.109:842): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.148317 kernel: audit: type=1400 audit(1734105405.109:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit: BPF prog-id=106 op=LOAD Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2151 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353364636632656335396131656233323263383737613135653230 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2151 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353364636632656335396131656233323263383737613135653230 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.109000 audit: BPF prog-id=107 op=LOAD Dec 13 15:56:45.109000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00025ba10 items=0 ppid=2151 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353364636632656335396131656233323263383737613135653230 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.117000 audit: BPF prog-id=108 op=LOAD Dec 13 15:56:45.117000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00025ba58 items=0 ppid=2151 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:45.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353364636632656335396131656233323263383737613135653230 Dec 13 15:56:45.132000 audit: BPF prog-id=108 op=UNLOAD Dec 13 15:56:45.132000 audit: BPF prog-id=107 op=UNLOAD Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:45.132000 audit: BPF prog-id=109 op=LOAD Dec 13 15:56:45.132000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00025be68 items=0 ppid=2151 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:45.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353364636632656335396131656233323263383737613135653230 Dec 13 15:56:45.199844 env[1203]: time="2024-12-13T15:56:45.199781344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-22glv,Uid:c29ea826-51c1-4a2a-a215-96a877710b46,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7\"" Dec 13 15:56:45.202702 env[1203]: time="2024-12-13T15:56:45.202666217Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 15:56:45.812250 kubelet[2064]: E1213 15:56:45.812073 2064 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Dec 13 15:56:45.814134 kubelet[2064]: E1213 15:56:45.812264 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-proxy podName:349ac834-9a30-4bf8-a21a-1e35f4fb7130 nodeName:}" failed. No retries permitted until 2024-12-13 15:56:46.31219445 +0000 UTC m=+14.493465001 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-proxy") pod "kube-proxy-r67kq" (UID: "349ac834-9a30-4bf8-a21a-1e35f4fb7130") : failed to sync configmap cache: timed out waiting for the condition Dec 13 15:56:45.832474 kubelet[2064]: E1213 15:56:45.832441 2064 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 15:56:45.832702 kubelet[2064]: E1213 15:56:45.832661 2064 projected.go:200] Error preparing data for projected volume kube-api-access-wrjl2 for pod kube-system/kube-proxy-r67kq: failed to sync configmap cache: timed out waiting for the condition Dec 13 15:56:45.832947 kubelet[2064]: E1213 15:56:45.832915 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-api-access-wrjl2 podName:349ac834-9a30-4bf8-a21a-1e35f4fb7130 nodeName:}" failed. No retries permitted until 2024-12-13 15:56:46.33288369 +0000 UTC m=+14.514154241 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-wrjl2" (UniqueName: "kubernetes.io/projected/349ac834-9a30-4bf8-a21a-1e35f4fb7130-kube-api-access-wrjl2") pod "kube-proxy-r67kq" (UID: "349ac834-9a30-4bf8-a21a-1e35f4fb7130") : failed to sync configmap cache: timed out waiting for the condition Dec 13 15:56:45.848063 systemd[1]: run-containerd-runc-k8s.io-7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7-runc.gKhneX.mount: Deactivated successfully. Dec 13 15:56:46.438857 env[1203]: time="2024-12-13T15:56:46.438262940Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r67kq,Uid:349ac834-9a30-4bf8-a21a-1e35f4fb7130,Namespace:kube-system,Attempt:0,}" Dec 13 15:56:46.461753 env[1203]: time="2024-12-13T15:56:46.461581463Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:46.461975 env[1203]: time="2024-12-13T15:56:46.461698921Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:46.462135 env[1203]: time="2024-12-13T15:56:46.462075722Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:46.462918 env[1203]: time="2024-12-13T15:56:46.462772459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189 pid=2194 runtime=io.containerd.runc.v2 Dec 13 15:56:46.486037 systemd[1]: Started cri-containerd-62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189.scope. Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.521000 audit: BPF prog-id=110 op=LOAD Dec 13 15:56:46.525000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.525000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616639343463353539346334623137653164326361353930303838 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616639343463353539346334623137653164326361353930303838 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit: BPF prog-id=111 op=LOAD Dec 13 15:56:46.526000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000213100 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616639343463353539346334623137653164326361353930303838 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit: BPF prog-id=112 op=LOAD Dec 13 15:56:46.526000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213148 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616639343463353539346334623137653164326361353930303838 Dec 13 15:56:46.526000 audit: BPF prog-id=112 op=UNLOAD Dec 13 15:56:46.526000 audit: BPF prog-id=111 op=UNLOAD Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.526000 audit: BPF prog-id=113 op=LOAD Dec 13 15:56:46.526000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213558 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616639343463353539346334623137653164326361353930303838 Dec 13 15:56:46.545076 env[1203]: time="2024-12-13T15:56:46.545020641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r67kq,Uid:349ac834-9a30-4bf8-a21a-1e35f4fb7130,Namespace:kube-system,Attempt:0,} returns sandbox id \"62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189\"" Dec 13 15:56:46.550760 env[1203]: time="2024-12-13T15:56:46.550695796Z" level=info msg="CreateContainer within sandbox \"62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:56:46.566746 env[1203]: time="2024-12-13T15:56:46.566697824Z" level=info msg="CreateContainer within sandbox \"62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"860ec0fe3f4261ae30da077fb62eeb87af518a2e5c36887e60b07a4289c2aac7\"" Dec 13 15:56:46.568764 env[1203]: time="2024-12-13T15:56:46.567653137Z" level=info msg="StartContainer for \"860ec0fe3f4261ae30da077fb62eeb87af518a2e5c36887e60b07a4289c2aac7\"" Dec 13 15:56:46.595221 systemd[1]: Started cri-containerd-860ec0fe3f4261ae30da077fb62eeb87af518a2e5c36887e60b07a4289c2aac7.scope. Dec 13 15:56:46.634000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.634000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5b35923608 items=0 ppid=2194 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306563306665336634323631616533306461303737666236326565 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.635000 audit: BPF prog-id=114 op=LOAD Dec 13 15:56:46.635000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d6218 items=0 ppid=2194 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306563306665336634323631616533306461303737666236326565 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.636000 audit: BPF prog-id=115 op=LOAD Dec 13 15:56:46.636000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d6268 items=0 ppid=2194 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306563306665336634323631616533306461303737666236326565 Dec 13 15:56:46.637000 audit: BPF prog-id=115 op=UNLOAD Dec 13 15:56:46.638000 audit: BPF prog-id=114 op=UNLOAD Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:46.638000 audit: BPF prog-id=116 op=LOAD Dec 13 15:56:46.638000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d62f8 items=0 ppid=2194 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836306563306665336634323631616533306461303737666236326565 Dec 13 15:56:46.667330 env[1203]: time="2024-12-13T15:56:46.667267817Z" level=info msg="StartContainer for \"860ec0fe3f4261ae30da077fb62eeb87af518a2e5c36887e60b07a4289c2aac7\" returns successfully" Dec 13 15:56:46.852416 systemd[1]: run-containerd-runc-k8s.io-62af944c5594c4b17e1d2ca59008864c7ff31eb88f626636f89811f0eda76189-runc.IiRb7z.mount: Deactivated successfully. Dec 13 15:56:46.969000 audit[2286]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:46.969000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7ae43cf0 a2=0 a3=7ffd7ae43cdc items=0 ppid=2245 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:56:46.972000 audit[2289]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:46.972000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd13433480 a2=0 a3=7ffd1343346c items=0 ppid=2245 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:56:46.978000 audit[2287]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:46.978000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb1b85850 a2=0 a3=7fffb1b8583c items=0 ppid=2245 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:56:46.981000 audit[2290]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:46.981000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc535c8690 a2=0 a3=7ffc535c867c items=0 ppid=2245 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:56:46.983000 audit[2291]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:46.983000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff36980b90 a2=0 a3=7fff36980b7c items=0 ppid=2245 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:56:46.998000 audit[2292]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:46.998000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91ebd590 a2=0 a3=7ffd91ebd57c items=0 ppid=2245 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:46.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:56:47.081000 audit[2293]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.081000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffeaf85740 a2=0 a3=7fffeaf8572c items=0 ppid=2245 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:56:47.087000 audit[2295]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.087000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffe22a0570 a2=0 a3=7fffe22a055c items=0 ppid=2245 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:56:47.094000 audit[2298]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.094000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff8cac8ac0 a2=0 a3=7fff8cac8aac items=0 ppid=2245 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:56:47.096000 audit[2299]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.096000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc47f1750 a2=0 a3=7ffdc47f173c items=0 ppid=2245 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:56:47.100000 audit[2301]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.100000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce40c6a00 a2=0 a3=7ffce40c69ec items=0 ppid=2245 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:56:47.102000 audit[2302]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.102000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc28b5d560 a2=0 a3=7ffc28b5d54c items=0 ppid=2245 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:56:47.107000 audit[2304]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.107000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe599c6240 a2=0 a3=7ffe599c622c items=0 ppid=2245 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:56:47.114000 audit[2307]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.114000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb6769bc0 a2=0 a3=7fffb6769bac items=0 ppid=2245 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:56:47.118000 audit[2308]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.118000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69aaaf10 a2=0 a3=7ffd69aaaefc items=0 ppid=2245 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:56:47.123000 audit[2310]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.123000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff77238910 a2=0 a3=7fff772388fc items=0 ppid=2245 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:56:47.125000 audit[2311]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.128749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount869743838.mount: Deactivated successfully. Dec 13 15:56:47.125000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe48925580 a2=0 a3=7ffe4892556c items=0 ppid=2245 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:56:47.138000 audit[2313]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.138000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4e022a80 a2=0 a3=7ffe4e022a6c items=0 ppid=2245 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:56:47.145000 audit[2316]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.145000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff59d9e970 a2=0 a3=7fff59d9e95c items=0 ppid=2245 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:56:47.158000 audit[2319]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.158000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdcf01d50 a2=0 a3=7fffdcf01d3c items=0 ppid=2245 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:56:47.161000 audit[2320]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.161000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1924d240 a2=0 a3=7ffd1924d22c items=0 ppid=2245 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:56:47.178000 audit[2322]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.178000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffec9ce0780 a2=0 a3=7ffec9ce076c items=0 ppid=2245 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:56:47.190723 kubelet[2064]: I1213 15:56:47.190667 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-r67kq" podStartSLOduration=3.187526731 podStartE2EDuration="3.187526731s" podCreationTimestamp="2024-12-13 15:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:56:47.187317234 +0000 UTC m=+15.368587826" watchObservedRunningTime="2024-12-13 15:56:47.187526731 +0000 UTC m=+15.368797300" Dec 13 15:56:47.198000 audit[2325]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.198000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe28c296c0 a2=0 a3=7ffe28c296ac items=0 ppid=2245 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:56:47.203000 audit[2326]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.203000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf99aaf20 a2=0 a3=7ffcf99aaf0c items=0 ppid=2245 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:56:47.210000 audit[2328]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:56:47.210000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffda6e0b170 a2=0 a3=7ffda6e0b15c items=0 ppid=2245 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:56:47.260000 audit[2334]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:47.260000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff2db17470 a2=0 a3=7fff2db1745c items=0 ppid=2245 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:47.276000 audit[2334]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:47.276000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff2db17470 a2=0 a3=7fff2db1745c items=0 ppid=2245 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:47.280000 audit[2339]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.280000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee9381440 a2=0 a3=7ffee938142c items=0 ppid=2245 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:56:47.289000 audit[2341]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.289000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca40b4340 a2=0 a3=7ffca40b432c items=0 ppid=2245 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:56:47.299000 audit[2344]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.299000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdbf24a990 a2=0 a3=7ffdbf24a97c items=0 ppid=2245 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:56:47.301000 audit[2345]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.301000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd145ce7a0 a2=0 a3=7ffd145ce78c items=0 ppid=2245 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:56:47.306000 audit[2347]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.306000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea94d42b0 a2=0 a3=7ffea94d429c items=0 ppid=2245 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:56:47.315000 audit[2348]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.315000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa85ba4f0 a2=0 a3=7fffa85ba4dc items=0 ppid=2245 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:56:47.320000 audit[2350]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.320000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc63656eb0 a2=0 a3=7ffc63656e9c items=0 ppid=2245 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:56:47.328000 audit[2353]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.328000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcc561f260 a2=0 a3=7ffcc561f24c items=0 ppid=2245 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:56:47.331000 audit[2354]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.331000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6d155b90 a2=0 a3=7ffe6d155b7c items=0 ppid=2245 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:56:47.335000 audit[2356]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.335000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd33aaf960 a2=0 a3=7ffd33aaf94c items=0 ppid=2245 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:56:47.336000 audit[2357]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.336000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcd2fee40 a2=0 a3=7ffdcd2fee2c items=0 ppid=2245 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:56:47.342000 audit[2359]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.342000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe644140a0 a2=0 a3=7ffe6441408c items=0 ppid=2245 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:56:47.358000 audit[2362]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.358000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8daa1bd0 a2=0 a3=7ffe8daa1bbc items=0 ppid=2245 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:56:47.367000 audit[2365]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.367000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff34d5e740 a2=0 a3=7fff34d5e72c items=0 ppid=2245 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:56:47.369000 audit[2366]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.369000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc20be1f50 a2=0 a3=7ffc20be1f3c items=0 ppid=2245 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:56:47.375000 audit[2368]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.375000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc3ac34e00 a2=0 a3=7ffc3ac34dec items=0 ppid=2245 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:56:47.392000 audit[2371]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.392000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdc7a83ff0 a2=0 a3=7ffdc7a83fdc items=0 ppid=2245 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:56:47.394000 audit[2372]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.394000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b43c850 a2=0 a3=7ffe1b43c83c items=0 ppid=2245 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:56:47.399000 audit[2374]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.399000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffbbf4ad30 a2=0 a3=7fffbbf4ad1c items=0 ppid=2245 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:56:47.401000 audit[2375]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.401000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd86bd29d0 a2=0 a3=7ffd86bd29bc items=0 ppid=2245 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:56:47.405000 audit[2377]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.405000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff301d6120 a2=0 a3=7fff301d610c items=0 ppid=2245 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:56:47.415000 audit[2380]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:56:47.415000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5549c570 a2=0 a3=7fff5549c55c items=0 ppid=2245 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:56:47.420000 audit[2382]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:56:47.420000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe71250c30 a2=0 a3=7ffe71250c1c items=0 ppid=2245 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.420000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:47.420000 audit[2382]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:56:47.420000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe71250c30 a2=0 a3=7ffe71250c1c items=0 ppid=2245 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:47.420000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:48.778965 env[1203]: time="2024-12-13T15:56:48.778902838Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:48.782353 env[1203]: time="2024-12-13T15:56:48.782319279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:48.785473 env[1203]: time="2024-12-13T15:56:48.785394197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:48.788892 env[1203]: time="2024-12-13T15:56:48.788858328Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:48.790062 env[1203]: time="2024-12-13T15:56:48.790014614Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 15:56:48.795127 env[1203]: time="2024-12-13T15:56:48.795051169Z" level=info msg="CreateContainer within sandbox \"7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 15:56:48.809284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount289558300.mount: Deactivated successfully. Dec 13 15:56:48.818406 env[1203]: time="2024-12-13T15:56:48.818360928Z" level=info msg="CreateContainer within sandbox \"7253dcf2ec59a1eb322c877a15e204d934a73a35aeac626a8b401fabc5ee98f7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"09bbc4f073c2697e90c3b4fbfe331c96ae0412fc6772429286590ee1d0123f08\"" Dec 13 15:56:48.819525 env[1203]: time="2024-12-13T15:56:48.819489642Z" level=info msg="StartContainer for \"09bbc4f073c2697e90c3b4fbfe331c96ae0412fc6772429286590ee1d0123f08\"" Dec 13 15:56:48.858161 systemd[1]: Started cri-containerd-09bbc4f073c2697e90c3b4fbfe331c96ae0412fc6772429286590ee1d0123f08.scope. Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880411 kernel: kauditd_printk_skb: 303 callbacks suppressed Dec 13 15:56:48.880866 kernel: audit: type=1400 audit(1734105408.874:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890673 kernel: audit: type=1400 audit(1734105408.874:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.903879 kernel: audit: type=1400 audit(1734105408.874:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.903978 kernel: audit: type=1400 audit(1734105408.874:933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.909607 kernel: audit: type=1400 audit(1734105408.874:934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.916771 kernel: audit: type=1400 audit(1734105408.874:935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.916863 kernel: audit: type=1400 audit(1734105408.874:936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.936991 kernel: audit: type=1400 audit(1734105408.874:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.937088 kernel: audit: type=1400 audit(1734105408.874:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.937167 kernel: audit: type=1400 audit(1734105408.874:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.874000 audit: BPF prog-id=117 op=LOAD Dec 13 15:56:48.879000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.879000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2151 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:48.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626263346630373363323639376539306333623466626665333331 Dec 13 15:56:48.879000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.879000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2151 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:48.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626263346630373363323639376539306333623466626665333331 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.880000 audit: BPF prog-id=118 op=LOAD Dec 13 15:56:48.880000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283740 items=0 ppid=2151 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:48.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626263346630373363323639376539306333623466626665333331 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit: BPF prog-id=119 op=LOAD Dec 13 15:56:48.890000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283788 items=0 ppid=2151 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:48.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626263346630373363323639376539306333623466626665333331 Dec 13 15:56:48.890000 audit: BPF prog-id=119 op=UNLOAD Dec 13 15:56:48.890000 audit: BPF prog-id=118 op=UNLOAD Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:48.890000 audit: BPF prog-id=120 op=LOAD Dec 13 15:56:48.890000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283b98 items=0 ppid=2151 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:48.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626263346630373363323639376539306333623466626665333331 Dec 13 15:56:48.960973 env[1203]: time="2024-12-13T15:56:48.960879562Z" level=info msg="StartContainer for \"09bbc4f073c2697e90c3b4fbfe331c96ae0412fc6772429286590ee1d0123f08\" returns successfully" Dec 13 15:56:52.096877 kubelet[2064]: I1213 15:56:52.096816 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-22glv" podStartSLOduration=4.5072234810000005 podStartE2EDuration="8.096757058s" podCreationTimestamp="2024-12-13 15:56:44 +0000 UTC" firstStartedPulling="2024-12-13 15:56:45.201958201 +0000 UTC m=+13.383228758" lastFinishedPulling="2024-12-13 15:56:48.791491769 +0000 UTC m=+16.972762335" observedRunningTime="2024-12-13 15:56:49.174379486 +0000 UTC m=+17.355650055" watchObservedRunningTime="2024-12-13 15:56:52.096757058 +0000 UTC m=+20.278027624" Dec 13 15:56:52.344000 audit[2423]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:52.344000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffe8892a80 a2=0 a3=7fffe8892a6c items=0 ppid=2245 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:52.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:52.348000 audit[2423]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:52.348000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe8892a80 a2=0 a3=0 items=0 ppid=2245 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:52.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:52.409000 audit[2425]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:52.409000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd34d7e6a0 a2=0 a3=7ffd34d7e68c items=0 ppid=2245 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:52.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:52.415000 audit[2425]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:52.415000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd34d7e6a0 a2=0 a3=0 items=0 ppid=2245 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:52.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:52.505207 kubelet[2064]: I1213 15:56:52.505154 2064 topology_manager.go:215] "Topology Admit Handler" podUID="70bbf866-18ea-4486-9822-7ef173408079" podNamespace="calico-system" podName="calico-typha-5bdd856bf6-chflg" Dec 13 15:56:52.513503 systemd[1]: Created slice kubepods-besteffort-pod70bbf866_18ea_4486_9822_7ef173408079.slice. Dec 13 15:56:52.664881 kubelet[2064]: I1213 15:56:52.664720 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/70bbf866-18ea-4486-9822-7ef173408079-typha-certs\") pod \"calico-typha-5bdd856bf6-chflg\" (UID: \"70bbf866-18ea-4486-9822-7ef173408079\") " pod="calico-system/calico-typha-5bdd856bf6-chflg" Dec 13 15:56:52.665149 kubelet[2064]: I1213 15:56:52.665122 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bw6rx\" (UniqueName: \"kubernetes.io/projected/70bbf866-18ea-4486-9822-7ef173408079-kube-api-access-bw6rx\") pod \"calico-typha-5bdd856bf6-chflg\" (UID: \"70bbf866-18ea-4486-9822-7ef173408079\") " pod="calico-system/calico-typha-5bdd856bf6-chflg" Dec 13 15:56:52.665903 kubelet[2064]: I1213 15:56:52.665302 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/70bbf866-18ea-4486-9822-7ef173408079-tigera-ca-bundle\") pod \"calico-typha-5bdd856bf6-chflg\" (UID: \"70bbf866-18ea-4486-9822-7ef173408079\") " pod="calico-system/calico-typha-5bdd856bf6-chflg" Dec 13 15:56:52.665903 kubelet[2064]: I1213 15:56:52.665582 2064 topology_manager.go:215] "Topology Admit Handler" podUID="43709023-88e8-4eb1-87e9-beb7f18c1dd8" podNamespace="calico-system" podName="calico-node-t2vxj" Dec 13 15:56:52.675903 systemd[1]: Created slice kubepods-besteffort-pod43709023_88e8_4eb1_87e9_beb7f18c1dd8.slice. Dec 13 15:56:52.766374 kubelet[2064]: I1213 15:56:52.765600 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/43709023-88e8-4eb1-87e9-beb7f18c1dd8-node-certs\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.766707 kubelet[2064]: I1213 15:56:52.766680 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-var-run-calico\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.767043 kubelet[2064]: I1213 15:56:52.767017 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-cni-log-dir\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.767265 kubelet[2064]: I1213 15:56:52.767234 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-policysync\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.767888 kubelet[2064]: I1213 15:56:52.767862 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/43709023-88e8-4eb1-87e9-beb7f18c1dd8-tigera-ca-bundle\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768516 kubelet[2064]: I1213 15:56:52.768492 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rfjcx\" (UniqueName: \"kubernetes.io/projected/43709023-88e8-4eb1-87e9-beb7f18c1dd8-kube-api-access-rfjcx\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768711 kubelet[2064]: I1213 15:56:52.768654 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-cni-bin-dir\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768842 kubelet[2064]: I1213 15:56:52.768725 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-lib-modules\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768842 kubelet[2064]: I1213 15:56:52.768792 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-xtables-lock\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768975 kubelet[2064]: I1213 15:56:52.768853 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-var-lib-calico\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768975 kubelet[2064]: I1213 15:56:52.768891 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-flexvol-driver-host\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.768975 kubelet[2064]: I1213 15:56:52.768947 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/43709023-88e8-4eb1-87e9-beb7f18c1dd8-cni-net-dir\") pod \"calico-node-t2vxj\" (UID: \"43709023-88e8-4eb1-87e9-beb7f18c1dd8\") " pod="calico-system/calico-node-t2vxj" Dec 13 15:56:52.811210 kubelet[2064]: I1213 15:56:52.811159 2064 topology_manager.go:215] "Topology Admit Handler" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" podNamespace="calico-system" podName="csi-node-driver-cqqzv" Dec 13 15:56:52.811545 kubelet[2064]: E1213 15:56:52.811513 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:56:52.820614 env[1203]: time="2024-12-13T15:56:52.819627407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bdd856bf6-chflg,Uid:70bbf866-18ea-4486-9822-7ef173408079,Namespace:calico-system,Attempt:0,}" Dec 13 15:56:52.858901 env[1203]: time="2024-12-13T15:56:52.858551044Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:52.858901 env[1203]: time="2024-12-13T15:56:52.858632818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:52.858901 env[1203]: time="2024-12-13T15:56:52.858651536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:52.859475 env[1203]: time="2024-12-13T15:56:52.859395258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/773613009d47ebb6b6ef59cda308fa6422b7ec56e597a7e473ad46f308af990b pid=2434 runtime=io.containerd.runc.v2 Dec 13 15:56:52.872055 kubelet[2064]: I1213 15:56:52.869873 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/009bebc9-013c-4d7e-9ae4-7bb3c5895dc1-varrun\") pod \"csi-node-driver-cqqzv\" (UID: \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\") " pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:56:52.872055 kubelet[2064]: I1213 15:56:52.869982 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/009bebc9-013c-4d7e-9ae4-7bb3c5895dc1-kubelet-dir\") pod \"csi-node-driver-cqqzv\" (UID: \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\") " pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:56:52.872055 kubelet[2064]: I1213 15:56:52.870094 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5nlg\" (UniqueName: \"kubernetes.io/projected/009bebc9-013c-4d7e-9ae4-7bb3c5895dc1-kube-api-access-z5nlg\") pod \"csi-node-driver-cqqzv\" (UID: \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\") " pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:56:52.872055 kubelet[2064]: I1213 15:56:52.870189 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/009bebc9-013c-4d7e-9ae4-7bb3c5895dc1-socket-dir\") pod \"csi-node-driver-cqqzv\" (UID: \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\") " pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:56:52.872055 kubelet[2064]: I1213 15:56:52.870292 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/009bebc9-013c-4d7e-9ae4-7bb3c5895dc1-registration-dir\") pod \"csi-node-driver-cqqzv\" (UID: \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\") " pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:56:52.876929 kubelet[2064]: E1213 15:56:52.873480 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.876929 kubelet[2064]: W1213 15:56:52.873514 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.876929 kubelet[2064]: E1213 15:56:52.873555 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.885772 kubelet[2064]: E1213 15:56:52.879312 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.885772 kubelet[2064]: W1213 15:56:52.879341 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.885772 kubelet[2064]: E1213 15:56:52.879366 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.887595 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.890405 kubelet[2064]: W1213 15:56:52.887628 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.887663 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.888063 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.890405 kubelet[2064]: W1213 15:56:52.888078 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.888096 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.888391 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.890405 kubelet[2064]: W1213 15:56:52.888405 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.888439 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.890405 kubelet[2064]: E1213 15:56:52.888692 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895120 kubelet[2064]: W1213 15:56:52.888706 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.888723 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.889860 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895120 kubelet[2064]: W1213 15:56:52.889878 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.890035 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.890637 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895120 kubelet[2064]: W1213 15:56:52.890651 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.890680 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895120 kubelet[2064]: E1213 15:56:52.890946 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895120 kubelet[2064]: W1213 15:56:52.890971 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.890988 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.891312 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895614 kubelet[2064]: W1213 15:56:52.891327 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.891344 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.891637 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895614 kubelet[2064]: W1213 15:56:52.891651 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.891669 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.891971 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.895614 kubelet[2064]: W1213 15:56:52.891985 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.895614 kubelet[2064]: E1213 15:56:52.892002 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.892243 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.896181 kubelet[2064]: W1213 15:56:52.892267 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.892283 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.894207 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.896181 kubelet[2064]: W1213 15:56:52.894223 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.894245 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.895685 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.896181 kubelet[2064]: W1213 15:56:52.895700 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.895718 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.896181 kubelet[2064]: E1213 15:56:52.896052 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.896695 kubelet[2064]: W1213 15:56:52.896068 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.896695 kubelet[2064]: E1213 15:56:52.896086 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909119 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.910772 kubelet[2064]: W1213 15:56:52.909152 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909183 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909524 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.910772 kubelet[2064]: W1213 15:56:52.909548 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909575 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909877 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.910772 kubelet[2064]: W1213 15:56:52.909890 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.909919 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.910772 kubelet[2064]: E1213 15:56:52.910188 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.911502 kubelet[2064]: W1213 15:56:52.910202 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.911502 kubelet[2064]: E1213 15:56:52.910218 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.911502 kubelet[2064]: E1213 15:56:52.910487 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.911502 kubelet[2064]: W1213 15:56:52.910501 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.911502 kubelet[2064]: E1213 15:56:52.910518 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.911502 kubelet[2064]: E1213 15:56:52.910890 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.911502 kubelet[2064]: W1213 15:56:52.910915 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.911502 kubelet[2064]: E1213 15:56:52.910934 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.926839 kubelet[2064]: E1213 15:56:52.925794 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.926839 kubelet[2064]: W1213 15:56:52.925836 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.926839 kubelet[2064]: E1213 15:56:52.925866 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.950632 systemd[1]: Started cri-containerd-773613009d47ebb6b6ef59cda308fa6422b7ec56e597a7e473ad46f308af990b.scope. Dec 13 15:56:52.971840 kubelet[2064]: E1213 15:56:52.971797 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.971840 kubelet[2064]: W1213 15:56:52.971829 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.972125 kubelet[2064]: E1213 15:56:52.971861 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.972298 kubelet[2064]: E1213 15:56:52.972267 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.972298 kubelet[2064]: W1213 15:56:52.972295 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.972474 kubelet[2064]: E1213 15:56:52.972322 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.972687 kubelet[2064]: E1213 15:56:52.972659 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.972687 kubelet[2064]: W1213 15:56:52.972679 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.972854 kubelet[2064]: E1213 15:56:52.972704 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.973088 kubelet[2064]: E1213 15:56:52.973049 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.973088 kubelet[2064]: W1213 15:56:52.973088 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.973251 kubelet[2064]: E1213 15:56:52.973112 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.973481 kubelet[2064]: E1213 15:56:52.973452 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.973481 kubelet[2064]: W1213 15:56:52.973472 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.973619 kubelet[2064]: E1213 15:56:52.973594 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.973912 kubelet[2064]: E1213 15:56:52.973881 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.973912 kubelet[2064]: W1213 15:56:52.973901 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.974039 kubelet[2064]: E1213 15:56:52.974024 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.974248 kubelet[2064]: E1213 15:56:52.974222 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.974324 kubelet[2064]: W1213 15:56:52.974250 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.974385 kubelet[2064]: E1213 15:56:52.974374 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.974604 kubelet[2064]: E1213 15:56:52.974576 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.974604 kubelet[2064]: W1213 15:56:52.974604 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.974774 kubelet[2064]: E1213 15:56:52.974723 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.974952 kubelet[2064]: E1213 15:56:52.974926 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.974952 kubelet[2064]: W1213 15:56:52.974945 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.975087 kubelet[2064]: E1213 15:56:52.975062 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.975275 kubelet[2064]: E1213 15:56:52.975249 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.975362 kubelet[2064]: W1213 15:56:52.975268 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.975441 kubelet[2064]: E1213 15:56:52.975385 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.975612 kubelet[2064]: E1213 15:56:52.975585 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.975612 kubelet[2064]: W1213 15:56:52.975604 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.975776 kubelet[2064]: E1213 15:56:52.975716 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.975951 kubelet[2064]: E1213 15:56:52.975925 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.975951 kubelet[2064]: W1213 15:56:52.975943 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.976105 kubelet[2064]: E1213 15:56:52.976073 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.976283 kubelet[2064]: E1213 15:56:52.976256 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.976283 kubelet[2064]: W1213 15:56:52.976278 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.976434 kubelet[2064]: E1213 15:56:52.976396 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.979608 kubelet[2064]: E1213 15:56:52.979575 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.979608 kubelet[2064]: W1213 15:56:52.979598 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.979772 kubelet[2064]: E1213 15:56:52.979752 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.980060 kubelet[2064]: E1213 15:56:52.980032 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.980060 kubelet[2064]: W1213 15:56:52.980052 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.980218 kubelet[2064]: E1213 15:56:52.980179 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.980493 kubelet[2064]: E1213 15:56:52.980463 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.980493 kubelet[2064]: W1213 15:56:52.980484 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.981196 kubelet[2064]: E1213 15:56:52.981171 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.981288 kubelet[2064]: E1213 15:56:52.981279 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.981359 kubelet[2064]: W1213 15:56:52.981292 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.982229 kubelet[2064]: E1213 15:56:52.981436 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.982326 env[1203]: time="2024-12-13T15:56:52.981779237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t2vxj,Uid:43709023-88e8-4eb1-87e9-beb7f18c1dd8,Namespace:calico-system,Attempt:0,}" Dec 13 15:56:52.982775 kubelet[2064]: E1213 15:56:52.982642 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.982775 kubelet[2064]: W1213 15:56:52.982664 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.982944 kubelet[2064]: E1213 15:56:52.982823 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.983374 kubelet[2064]: E1213 15:56:52.983214 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.983374 kubelet[2064]: W1213 15:56:52.983237 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.985649 kubelet[2064]: E1213 15:56:52.985590 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.985798 kubelet[2064]: E1213 15:56:52.985773 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.985798 kubelet[2064]: W1213 15:56:52.985794 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.985930 kubelet[2064]: E1213 15:56:52.985858 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.986322 kubelet[2064]: E1213 15:56:52.986295 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.986421 kubelet[2064]: W1213 15:56:52.986315 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.986502 kubelet[2064]: E1213 15:56:52.986457 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.987317 kubelet[2064]: E1213 15:56:52.987287 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.987317 kubelet[2064]: W1213 15:56:52.987308 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.987486 kubelet[2064]: E1213 15:56:52.987456 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.987975 kubelet[2064]: E1213 15:56:52.987916 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.987975 kubelet[2064]: W1213 15:56:52.987969 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.988134 kubelet[2064]: E1213 15:56:52.988047 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.988495 kubelet[2064]: E1213 15:56:52.988466 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.988568 kubelet[2064]: W1213 15:56:52.988494 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.988568 kubelet[2064]: E1213 15:56:52.988558 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:52.988986 kubelet[2064]: E1213 15:56:52.988956 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:52.988986 kubelet[2064]: W1213 15:56:52.988976 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:52.989321 kubelet[2064]: E1213 15:56:52.988995 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:53.010770 kubelet[2064]: E1213 15:56:53.010587 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:53.010770 kubelet[2064]: W1213 15:56:53.010618 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:53.010770 kubelet[2064]: E1213 15:56:53.010646 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:53.030003 env[1203]: time="2024-12-13T15:56:53.029875847Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:56:53.030483 env[1203]: time="2024-12-13T15:56:53.030275972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:56:53.030652 env[1203]: time="2024-12-13T15:56:53.030607430Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:56:53.031931 env[1203]: time="2024-12-13T15:56:53.031154132Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28 pid=2513 runtime=io.containerd.runc.v2 Dec 13 15:56:53.063977 systemd[1]: Started cri-containerd-332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28.scope. Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.163000 audit: BPF prog-id=121 op=LOAD Dec 13 15:56:53.165000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.165000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333631333030396434376562623662366566353963646133303866 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333631333030396434376562623662366566353963646133303866 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit: BPF prog-id=122 op=LOAD Dec 13 15:56:53.168000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280d50 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333631333030396434376562623662366566353963646133303866 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.168000 audit: BPF prog-id=123 op=LOAD Dec 13 15:56:53.168000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000280d98 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333631333030396434376562623662366566353963646133303866 Dec 13 15:56:53.168000 audit: BPF prog-id=123 op=UNLOAD Dec 13 15:56:53.169000 audit: BPF prog-id=122 op=UNLOAD Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.169000 audit: BPF prog-id=124 op=LOAD Dec 13 15:56:53.169000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002811a8 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333631333030396434376562623662366566353963646133303866 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.229000 audit: BPF prog-id=125 op=LOAD Dec 13 15:56:53.230000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.230000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2513 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326364303466346664333035383333346363616538653635336336 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2513 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326364303466346664333035383333346363616538653635336336 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.231000 audit: BPF prog-id=126 op=LOAD Dec 13 15:56:53.231000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035bfe0 items=0 ppid=2513 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326364303466346664333035383333346363616538653635336336 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.232000 audit: BPF prog-id=127 op=LOAD Dec 13 15:56:53.232000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c0028 items=0 ppid=2513 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326364303466346664333035383333346363616538653635336336 Dec 13 15:56:53.234000 audit: BPF prog-id=127 op=UNLOAD Dec 13 15:56:53.234000 audit: BPF prog-id=126 op=UNLOAD Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:53.234000 audit: BPF prog-id=128 op=LOAD Dec 13 15:56:53.234000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c0438 items=0 ppid=2513 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326364303466346664333035383333346363616538653635336336 Dec 13 15:56:53.266394 env[1203]: time="2024-12-13T15:56:53.266317888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bdd856bf6-chflg,Uid:70bbf866-18ea-4486-9822-7ef173408079,Namespace:calico-system,Attempt:0,} returns sandbox id \"773613009d47ebb6b6ef59cda308fa6422b7ec56e597a7e473ad46f308af990b\"" Dec 13 15:56:53.268918 env[1203]: time="2024-12-13T15:56:53.268881974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 15:56:53.277672 env[1203]: time="2024-12-13T15:56:53.277619401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t2vxj,Uid:43709023-88e8-4eb1-87e9-beb7f18c1dd8,Namespace:calico-system,Attempt:0,} returns sandbox id \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\"" Dec 13 15:56:53.438000 audit[2563]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:53.438000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffefb3d9760 a2=0 a3=7ffefb3d974c items=0 ppid=2245 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:53.445000 audit[2563]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:56:53.445000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffefb3d9760 a2=0 a3=0 items=0 ppid=2245 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:53.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:54.823139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2706655941.mount: Deactivated successfully. Dec 13 15:56:55.071575 kubelet[2064]: E1213 15:56:55.071513 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:56:56.502511 env[1203]: time="2024-12-13T15:56:56.502442715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:56.506102 env[1203]: time="2024-12-13T15:56:56.506068618Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:56.509143 env[1203]: time="2024-12-13T15:56:56.509097274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:56.512057 env[1203]: time="2024-12-13T15:56:56.511981529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:56.513355 env[1203]: time="2024-12-13T15:56:56.513263538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 15:56:56.518023 env[1203]: time="2024-12-13T15:56:56.516350855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:56:56.538229 env[1203]: time="2024-12-13T15:56:56.538179823Z" level=info msg="CreateContainer within sandbox \"773613009d47ebb6b6ef59cda308fa6422b7ec56e597a7e473ad46f308af990b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 15:56:56.553460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3673227715.mount: Deactivated successfully. Dec 13 15:56:56.560722 env[1203]: time="2024-12-13T15:56:56.560512179Z" level=info msg="CreateContainer within sandbox \"773613009d47ebb6b6ef59cda308fa6422b7ec56e597a7e473ad46f308af990b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"07f61309e8edccd63466359efe7242e8bbe3897ce9a4356ed8324c3dba793890\"" Dec 13 15:56:56.562615 env[1203]: time="2024-12-13T15:56:56.561277955Z" level=info msg="StartContainer for \"07f61309e8edccd63466359efe7242e8bbe3897ce9a4356ed8324c3dba793890\"" Dec 13 15:56:56.595088 systemd[1]: Started cri-containerd-07f61309e8edccd63466359efe7242e8bbe3897ce9a4356ed8324c3dba793890.scope. Dec 13 15:56:56.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.649800 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 15:56:56.649953 kernel: audit: type=1400 audit(1734105416.628:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661754 kernel: audit: type=1400 audit(1734105416.628:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.671784 kernel: audit: type=1400 audit(1734105416.633:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.682404 kernel: audit: type=1400 audit(1734105416.633:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.682510 kernel: audit: type=1400 audit(1734105416.633:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.682578 kernel: audit: type=1400 audit(1734105416.633:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.693758 kernel: audit: type=1400 audit(1734105416.633:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.699767 kernel: audit: type=1400 audit(1734105416.633:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.710105 kernel: audit: type=1400 audit(1734105416.633:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.710220 kernel: audit: type=1400 audit(1734105416.653:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.653000 audit: BPF prog-id=129 op=LOAD Dec 13 15:56:56.655000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.655000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2434 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:56.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663631333039653865646363643633343636333539656665373234 Dec 13 15:56:56.655000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.655000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2434 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:56.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663631333039653865646363643633343636333539656665373234 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.656000 audit: BPF prog-id=130 op=LOAD Dec 13 15:56:56.656000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003806f0 items=0 ppid=2434 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:56.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663631333039653865646363643633343636333539656665373234 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit: BPF prog-id=131 op=LOAD Dec 13 15:56:56.661000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000380738 items=0 ppid=2434 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:56.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663631333039653865646363643633343636333539656665373234 Dec 13 15:56:56.661000 audit: BPF prog-id=131 op=UNLOAD Dec 13 15:56:56.661000 audit: BPF prog-id=130 op=UNLOAD Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:56.661000 audit: BPF prog-id=132 op=LOAD Dec 13 15:56:56.661000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000380b48 items=0 ppid=2434 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:56.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663631333039653865646363643633343636333539656665373234 Dec 13 15:56:56.743360 env[1203]: time="2024-12-13T15:56:56.743270075Z" level=info msg="StartContainer for \"07f61309e8edccd63466359efe7242e8bbe3897ce9a4356ed8324c3dba793890\" returns successfully" Dec 13 15:56:57.071722 kubelet[2064]: E1213 15:56:57.071621 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:56:57.199140 kubelet[2064]: E1213 15:56:57.199054 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.199140 kubelet[2064]: W1213 15:56:57.199108 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.199140 kubelet[2064]: E1213 15:56:57.199143 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.199649 kubelet[2064]: E1213 15:56:57.199467 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.199649 kubelet[2064]: W1213 15:56:57.199492 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.199649 kubelet[2064]: E1213 15:56:57.199512 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.200130 kubelet[2064]: E1213 15:56:57.200103 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.200230 kubelet[2064]: W1213 15:56:57.200124 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.200230 kubelet[2064]: E1213 15:56:57.200155 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.200636 kubelet[2064]: E1213 15:56:57.200534 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.200636 kubelet[2064]: W1213 15:56:57.200558 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.200636 kubelet[2064]: E1213 15:56:57.200578 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.200955 kubelet[2064]: E1213 15:56:57.200900 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.200955 kubelet[2064]: W1213 15:56:57.200937 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.200955 kubelet[2064]: E1213 15:56:57.200955 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.201286 kubelet[2064]: E1213 15:56:57.201211 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.201286 kubelet[2064]: W1213 15:56:57.201231 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.201286 kubelet[2064]: E1213 15:56:57.201249 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.201559 kubelet[2064]: E1213 15:56:57.201532 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.201559 kubelet[2064]: W1213 15:56:57.201554 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.201699 kubelet[2064]: E1213 15:56:57.201571 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.201923 kubelet[2064]: E1213 15:56:57.201898 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.201923 kubelet[2064]: W1213 15:56:57.201917 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.202062 kubelet[2064]: E1213 15:56:57.201935 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.202232 kubelet[2064]: E1213 15:56:57.202200 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.202232 kubelet[2064]: W1213 15:56:57.202220 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.202232 kubelet[2064]: E1213 15:56:57.202237 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.202521 kubelet[2064]: E1213 15:56:57.202490 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.202521 kubelet[2064]: W1213 15:56:57.202519 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.202665 kubelet[2064]: E1213 15:56:57.202539 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.202857 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206079 kubelet[2064]: W1213 15:56:57.202877 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.202904 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.203143 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206079 kubelet[2064]: W1213 15:56:57.203156 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.203172 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.203479 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206079 kubelet[2064]: W1213 15:56:57.203492 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.203508 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206079 kubelet[2064]: E1213 15:56:57.203867 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206766 kubelet[2064]: W1213 15:56:57.204583 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.204610 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.204854 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206766 kubelet[2064]: W1213 15:56:57.204866 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.204883 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.205179 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206766 kubelet[2064]: W1213 15:56:57.205192 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.205208 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.206766 kubelet[2064]: E1213 15:56:57.205491 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.206766 kubelet[2064]: W1213 15:56:57.205505 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.207381 kubelet[2064]: E1213 15:56:57.205521 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208030 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.209437 kubelet[2064]: W1213 15:56:57.208051 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208082 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208374 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.209437 kubelet[2064]: W1213 15:56:57.208387 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208493 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208701 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.209437 kubelet[2064]: W1213 15:56:57.208713 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.208773 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.209437 kubelet[2064]: E1213 15:56:57.209001 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.210163 kubelet[2064]: W1213 15:56:57.209013 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209114 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209294 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.210163 kubelet[2064]: W1213 15:56:57.209315 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209340 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209580 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.210163 kubelet[2064]: W1213 15:56:57.209602 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209629 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.210163 kubelet[2064]: E1213 15:56:57.209975 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.210163 kubelet[2064]: W1213 15:56:57.209988 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.210758 kubelet[2064]: E1213 15:56:57.210106 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.210758 kubelet[2064]: E1213 15:56:57.210581 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.210758 kubelet[2064]: W1213 15:56:57.210594 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.210758 kubelet[2064]: E1213 15:56:57.210695 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.210925 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.211859 kubelet[2064]: W1213 15:56:57.210939 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211058 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211211 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.211859 kubelet[2064]: W1213 15:56:57.211223 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211246 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211502 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.211859 kubelet[2064]: W1213 15:56:57.211515 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211539 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.211859 kubelet[2064]: E1213 15:56:57.211849 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.212567 kubelet[2064]: W1213 15:56:57.211863 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.212567 kubelet[2064]: E1213 15:56:57.211890 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.213843 kubelet[2064]: E1213 15:56:57.213346 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.213843 kubelet[2064]: W1213 15:56:57.213367 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.213843 kubelet[2064]: E1213 15:56:57.213480 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.213843 kubelet[2064]: E1213 15:56:57.213679 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.213843 kubelet[2064]: W1213 15:56:57.213693 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.213843 kubelet[2064]: E1213 15:56:57.213710 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.214215 kubelet[2064]: E1213 15:56:57.214085 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.214215 kubelet[2064]: W1213 15:56:57.214099 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.214215 kubelet[2064]: E1213 15:56:57.214116 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:57.215756 kubelet[2064]: E1213 15:56:57.215105 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:57.215756 kubelet[2064]: W1213 15:56:57.215127 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:57.215756 kubelet[2064]: E1213 15:56:57.215146 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.187815 kubelet[2064]: I1213 15:56:58.187767 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:56:58.212090 kubelet[2064]: E1213 15:56:58.211607 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.212090 kubelet[2064]: W1213 15:56:58.211648 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.212090 kubelet[2064]: E1213 15:56:58.211680 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.212090 kubelet[2064]: E1213 15:56:58.211945 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.212090 kubelet[2064]: W1213 15:56:58.211959 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.212090 kubelet[2064]: E1213 15:56:58.211977 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.213135 kubelet[2064]: E1213 15:56:58.212669 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.213135 kubelet[2064]: W1213 15:56:58.212688 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.213135 kubelet[2064]: E1213 15:56:58.212707 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.213135 kubelet[2064]: E1213 15:56:58.212984 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.213135 kubelet[2064]: W1213 15:56:58.212997 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.213135 kubelet[2064]: E1213 15:56:58.213014 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.213703 kubelet[2064]: E1213 15:56:58.213558 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.213703 kubelet[2064]: W1213 15:56:58.213576 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.213703 kubelet[2064]: E1213 15:56:58.213594 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.214081 kubelet[2064]: E1213 15:56:58.214059 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.214204 kubelet[2064]: W1213 15:56:58.214180 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.214354 kubelet[2064]: E1213 15:56:58.214331 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.214713 kubelet[2064]: E1213 15:56:58.214691 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.214870 kubelet[2064]: W1213 15:56:58.214844 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.215030 kubelet[2064]: E1213 15:56:58.215007 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.215379 kubelet[2064]: E1213 15:56:58.215358 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.215494 kubelet[2064]: W1213 15:56:58.215469 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.215653 kubelet[2064]: E1213 15:56:58.215631 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.216606 kubelet[2064]: E1213 15:56:58.216584 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.216724 kubelet[2064]: W1213 15:56:58.216699 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.216893 kubelet[2064]: E1213 15:56:58.216870 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.219205 kubelet[2064]: E1213 15:56:58.219181 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.219368 kubelet[2064]: W1213 15:56:58.219341 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.219589 kubelet[2064]: E1213 15:56:58.219566 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.220728 kubelet[2064]: E1213 15:56:58.220705 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.220887 kubelet[2064]: W1213 15:56:58.220861 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.221028 kubelet[2064]: E1213 15:56:58.221005 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.221472 kubelet[2064]: E1213 15:56:58.221450 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.221638 kubelet[2064]: W1213 15:56:58.221612 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.221792 kubelet[2064]: E1213 15:56:58.221769 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.222181 kubelet[2064]: E1213 15:56:58.222160 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.222340 kubelet[2064]: W1213 15:56:58.222315 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.222467 kubelet[2064]: E1213 15:56:58.222444 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.222904 kubelet[2064]: E1213 15:56:58.222883 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.223022 kubelet[2064]: W1213 15:56:58.222998 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.223176 kubelet[2064]: E1213 15:56:58.223143 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.223562 kubelet[2064]: E1213 15:56:58.223541 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.223727 kubelet[2064]: W1213 15:56:58.223701 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.223879 kubelet[2064]: E1213 15:56:58.223856 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.224328 kubelet[2064]: E1213 15:56:58.224307 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.224453 kubelet[2064]: W1213 15:56:58.224429 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.224583 kubelet[2064]: E1213 15:56:58.224560 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.225038 kubelet[2064]: E1213 15:56:58.225017 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.225179 kubelet[2064]: W1213 15:56:58.225155 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.225331 kubelet[2064]: E1213 15:56:58.225308 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.225682 kubelet[2064]: E1213 15:56:58.225656 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.225682 kubelet[2064]: W1213 15:56:58.225679 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.225908 kubelet[2064]: E1213 15:56:58.225708 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.226227 kubelet[2064]: E1213 15:56:58.226203 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.226227 kubelet[2064]: W1213 15:56:58.226224 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.226379 kubelet[2064]: E1213 15:56:58.226261 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.226525 kubelet[2064]: E1213 15:56:58.226504 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.226525 kubelet[2064]: W1213 15:56:58.226523 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.226669 kubelet[2064]: E1213 15:56:58.226548 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.227021 kubelet[2064]: E1213 15:56:58.226998 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.227021 kubelet[2064]: W1213 15:56:58.227017 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.227197 kubelet[2064]: E1213 15:56:58.227172 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.227329 kubelet[2064]: E1213 15:56:58.227306 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.227329 kubelet[2064]: W1213 15:56:58.227327 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.227718 kubelet[2064]: E1213 15:56:58.227695 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.228101 kubelet[2064]: E1213 15:56:58.228078 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.228101 kubelet[2064]: W1213 15:56:58.228097 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.228239 kubelet[2064]: E1213 15:56:58.228124 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.228406 kubelet[2064]: E1213 15:56:58.228385 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.228406 kubelet[2064]: W1213 15:56:58.228403 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.228547 kubelet[2064]: E1213 15:56:58.228429 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.228860 kubelet[2064]: E1213 15:56:58.228836 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.228860 kubelet[2064]: W1213 15:56:58.228857 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.229103 kubelet[2064]: E1213 15:56:58.229066 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.229292 kubelet[2064]: E1213 15:56:58.229089 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.229414 kubelet[2064]: W1213 15:56:58.229389 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.229572 kubelet[2064]: E1213 15:56:58.229543 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.229905 kubelet[2064]: E1213 15:56:58.229883 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.230034 kubelet[2064]: W1213 15:56:58.230010 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.230254 kubelet[2064]: E1213 15:56:58.230213 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.231137 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.232274 kubelet[2064]: W1213 15:56:58.231157 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.231183 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.231660 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.232274 kubelet[2064]: W1213 15:56:58.231680 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.231856 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.232020 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.232274 kubelet[2064]: W1213 15:56:58.232039 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.232057 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.232274 kubelet[2064]: E1213 15:56:58.232278 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.232871 kubelet[2064]: W1213 15:56:58.232290 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.232871 kubelet[2064]: E1213 15:56:58.232307 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.232871 kubelet[2064]: E1213 15:56:58.232546 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.232871 kubelet[2064]: W1213 15:56:58.232559 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.232871 kubelet[2064]: E1213 15:56:58.232575 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.233773 kubelet[2064]: E1213 15:56:58.233266 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:56:58.233773 kubelet[2064]: W1213 15:56:58.233286 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:56:58.233773 kubelet[2064]: E1213 15:56:58.233305 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:56:58.339682 env[1203]: time="2024-12-13T15:56:58.339615562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:58.341472 env[1203]: time="2024-12-13T15:56:58.341431074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:58.344990 env[1203]: time="2024-12-13T15:56:58.344926903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:58.347815 env[1203]: time="2024-12-13T15:56:58.347772829Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:56:58.348836 env[1203]: time="2024-12-13T15:56:58.348767236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:56:58.352312 env[1203]: time="2024-12-13T15:56:58.352260393Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:56:58.369862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1141974830.mount: Deactivated successfully. Dec 13 15:56:58.381301 env[1203]: time="2024-12-13T15:56:58.381202733Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1\"" Dec 13 15:56:58.382778 env[1203]: time="2024-12-13T15:56:58.382717395Z" level=info msg="StartContainer for \"02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1\"" Dec 13 15:56:58.432804 systemd[1]: Started cri-containerd-02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1.scope. Dec 13 15:56:58.525232 systemd[1]: run-containerd-runc-k8s.io-02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1-runc.SpZxYu.mount: Deactivated successfully. Dec 13 15:56:58.571000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.571000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5c64652698 items=0 ppid=2513 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:58.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663339613161663831306262333039363538626333306437646666 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.572000 audit: BPF prog-id=133 op=LOAD Dec 13 15:56:58.572000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00025df78 items=0 ppid=2513 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:58.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663339613161663831306262333039363538626333306437646666 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.574000 audit: BPF prog-id=134 op=LOAD Dec 13 15:56:58.574000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00025dfc8 items=0 ppid=2513 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:58.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663339613161663831306262333039363538626333306437646666 Dec 13 15:56:58.575000 audit: BPF prog-id=134 op=UNLOAD Dec 13 15:56:58.575000 audit: BPF prog-id=133 op=UNLOAD Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:56:58.575000 audit: BPF prog-id=135 op=LOAD Dec 13 15:56:58.575000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c8058 items=0 ppid=2513 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:56:58.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032663339613161663831306262333039363538626333306437646666 Dec 13 15:56:58.614148 env[1203]: time="2024-12-13T15:56:58.614083728Z" level=info msg="StartContainer for \"02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1\" returns successfully" Dec 13 15:56:58.629583 systemd[1]: cri-containerd-02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1.scope: Deactivated successfully. Dec 13 15:56:58.633000 audit: BPF prog-id=135 op=UNLOAD Dec 13 15:56:58.668428 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1-rootfs.mount: Deactivated successfully. Dec 13 15:56:58.674052 env[1203]: time="2024-12-13T15:56:58.673975092Z" level=info msg="shim disconnected" id=02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1 Dec 13 15:56:58.674263 env[1203]: time="2024-12-13T15:56:58.674067058Z" level=warning msg="cleaning up after shim disconnected" id=02f39a1af810bb309658bc30d7dff2c86d26f8e50c2a4b27caac434c609f35d1 namespace=k8s.io Dec 13 15:56:58.674263 env[1203]: time="2024-12-13T15:56:58.674099117Z" level=info msg="cleaning up dead shim" Dec 13 15:56:58.685141 env[1203]: time="2024-12-13T15:56:58.685007296Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:56:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2717 runtime=io.containerd.runc.v2\n" Dec 13 15:56:59.072354 kubelet[2064]: E1213 15:56:59.072292 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:56:59.196145 env[1203]: time="2024-12-13T15:56:59.196076465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:56:59.216252 kubelet[2064]: I1213 15:56:59.216190 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5bdd856bf6-chflg" podStartSLOduration=3.969761662 podStartE2EDuration="7.216117882s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:56:53.268487496 +0000 UTC m=+21.449758047" lastFinishedPulling="2024-12-13 15:56:56.514843704 +0000 UTC m=+24.696114267" observedRunningTime="2024-12-13 15:56:57.215918404 +0000 UTC m=+25.397188982" watchObservedRunningTime="2024-12-13 15:56:59.216117882 +0000 UTC m=+27.397388520" Dec 13 15:57:01.071918 kubelet[2064]: E1213 15:57:01.071453 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:01.208390 kubelet[2064]: I1213 15:57:01.208326 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:57:01.303000 audit[2734]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:01.303000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc4f6f7c0 a2=0 a3=7ffcc4f6f7ac items=0 ppid=2245 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:01.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:01.309000 audit[2734]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:01.309000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcc4f6f7c0 a2=0 a3=7ffcc4f6f7ac items=0 ppid=2245 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:01.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:03.071809 kubelet[2064]: E1213 15:57:03.071533 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:05.072547 kubelet[2064]: E1213 15:57:05.072454 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:07.017401 env[1203]: time="2024-12-13T15:57:07.016574008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:07.018543 env[1203]: time="2024-12-13T15:57:07.018508427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:07.020307 env[1203]: time="2024-12-13T15:57:07.020274244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:07.022234 env[1203]: time="2024-12-13T15:57:07.022193275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:07.023347 env[1203]: time="2024-12-13T15:57:07.023309471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:57:07.027045 env[1203]: time="2024-12-13T15:57:07.027007423Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:57:07.053300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1926342969.mount: Deactivated successfully. Dec 13 15:57:07.057928 env[1203]: time="2024-12-13T15:57:07.057886691Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e\"" Dec 13 15:57:07.059914 env[1203]: time="2024-12-13T15:57:07.059071438Z" level=info msg="StartContainer for \"76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e\"" Dec 13 15:57:07.073882 kubelet[2064]: E1213 15:57:07.073582 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:07.104262 systemd[1]: Started cri-containerd-76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e.scope. Dec 13 15:57:07.111920 systemd[1]: run-containerd-runc-k8s.io-76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e-runc.qCnoqH.mount: Deactivated successfully. Dec 13 15:57:07.146000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.152656 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 15:57:07.152779 kernel: audit: type=1400 audit(1734105427.146:1017): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.146000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2faeb92168 items=0 ppid=2513 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:07.166779 kernel: audit: type=1300 audit(1734105427.146:1017): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2faeb92168 items=0 ppid=2513 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:07.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303439616535626534366463383031393865386166616639383761 Dec 13 15:57:07.174900 kernel: audit: type=1327 audit(1734105427.146:1017): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303439616535626534366463383031393865386166616639383761 Dec 13 15:57:07.175380 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.185136 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.190335 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.196046 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.196127 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.211366 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.211448 kernel: audit: type=1400 audit(1734105427.150:1018): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.150000 audit: BPF prog-id=136 op=LOAD Dec 13 15:57:07.150000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c83e8 items=0 ppid=2513 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:07.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303439616535626534366463383031393865386166616639383761 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit: BPF prog-id=137 op=LOAD Dec 13 15:57:07.157000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c8438 items=0 ppid=2513 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:07.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303439616535626534366463383031393865386166616639383761 Dec 13 15:57:07.157000 audit: BPF prog-id=137 op=UNLOAD Dec 13 15:57:07.157000 audit: BPF prog-id=136 op=UNLOAD Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:07.157000 audit: BPF prog-id=138 op=LOAD Dec 13 15:57:07.157000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c84c8 items=0 ppid=2513 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:07.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303439616535626534366463383031393865386166616639383761 Dec 13 15:57:07.217549 env[1203]: time="2024-12-13T15:57:07.217485207Z" level=info msg="StartContainer for \"76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e\" returns successfully" Dec 13 15:57:08.218898 env[1203]: time="2024-12-13T15:57:08.218813447Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:57:08.222051 systemd[1]: cri-containerd-76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e.scope: Deactivated successfully. Dec 13 15:57:08.225000 audit: BPF prog-id=138 op=UNLOAD Dec 13 15:57:08.275843 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e-rootfs.mount: Deactivated successfully. Dec 13 15:57:08.281098 kubelet[2064]: I1213 15:57:08.280993 2064 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:57:08.286297 env[1203]: time="2024-12-13T15:57:08.284415412Z" level=info msg="shim disconnected" id=76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e Dec 13 15:57:08.286297 env[1203]: time="2024-12-13T15:57:08.284478110Z" level=warning msg="cleaning up after shim disconnected" id=76049ae5be46dc80198e8afaf987a23524464bcceb5b52f30ce67d52d83ebc8e namespace=k8s.io Dec 13 15:57:08.286297 env[1203]: time="2024-12-13T15:57:08.284496110Z" level=info msg="cleaning up dead shim" Dec 13 15:57:08.307171 env[1203]: time="2024-12-13T15:57:08.307105235Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:57:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2785 runtime=io.containerd.runc.v2\n" Dec 13 15:57:08.327401 kubelet[2064]: I1213 15:57:08.327020 2064 topology_manager.go:215] "Topology Admit Handler" podUID="9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9" podNamespace="kube-system" podName="coredns-76f75df574-8hlp5" Dec 13 15:57:08.338076 kubelet[2064]: I1213 15:57:08.337408 2064 topology_manager.go:215] "Topology Admit Handler" podUID="98935422-a7cb-4bf5-95dc-671007a56ae6" podNamespace="kube-system" podName="coredns-76f75df574-5tkdn" Dec 13 15:57:08.338792 kubelet[2064]: W1213 15:57:08.338766 2064 reflector.go:539] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:57:08.339008 kubelet[2064]: E1213 15:57:08.338982 2064 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:srv-8d9xb.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-8d9xb.gb1.brightbox.com' and this object Dec 13 15:57:08.342155 systemd[1]: Created slice kubepods-burstable-pod9ec53c16_56c8_4c9a_9d1e_ebcef20cb6e9.slice. Dec 13 15:57:08.349908 kubelet[2064]: I1213 15:57:08.349878 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-255pr\" (UniqueName: \"kubernetes.io/projected/98935422-a7cb-4bf5-95dc-671007a56ae6-kube-api-access-255pr\") pod \"coredns-76f75df574-5tkdn\" (UID: \"98935422-a7cb-4bf5-95dc-671007a56ae6\") " pod="kube-system/coredns-76f75df574-5tkdn" Dec 13 15:57:08.350120 kubelet[2064]: I1213 15:57:08.350093 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9-config-volume\") pod \"coredns-76f75df574-8hlp5\" (UID: \"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9\") " pod="kube-system/coredns-76f75df574-8hlp5" Dec 13 15:57:08.350275 kubelet[2064]: I1213 15:57:08.350250 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtb8s\" (UniqueName: \"kubernetes.io/projected/9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9-kube-api-access-jtb8s\") pod \"coredns-76f75df574-8hlp5\" (UID: \"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9\") " pod="kube-system/coredns-76f75df574-8hlp5" Dec 13 15:57:08.350444 kubelet[2064]: I1213 15:57:08.350418 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/98935422-a7cb-4bf5-95dc-671007a56ae6-config-volume\") pod \"coredns-76f75df574-5tkdn\" (UID: \"98935422-a7cb-4bf5-95dc-671007a56ae6\") " pod="kube-system/coredns-76f75df574-5tkdn" Dec 13 15:57:08.353936 kubelet[2064]: I1213 15:57:08.353895 2064 topology_manager.go:215] "Topology Admit Handler" podUID="4b4ae775-3ac5-4022-a30e-f124eec91c0d" podNamespace="calico-apiserver" podName="calico-apiserver-55c688fc-hrtkg" Dec 13 15:57:08.355486 kubelet[2064]: I1213 15:57:08.355457 2064 topology_manager.go:215] "Topology Admit Handler" podUID="adadad57-fe17-4044-8f86-e95a257eba7f" podNamespace="calico-system" podName="calico-kube-controllers-7f454bbfd7-km4k7" Dec 13 15:57:08.356578 kubelet[2064]: I1213 15:57:08.356551 2064 topology_manager.go:215] "Topology Admit Handler" podUID="91009ef9-d84c-4dac-b013-a8397dac44f7" podNamespace="calico-apiserver" podName="calico-apiserver-55c688fc-6z2p6" Dec 13 15:57:08.359485 systemd[1]: Created slice kubepods-burstable-pod98935422_a7cb_4bf5_95dc_671007a56ae6.slice. Dec 13 15:57:08.372057 systemd[1]: Created slice kubepods-besteffort-pod91009ef9_d84c_4dac_b013_a8397dac44f7.slice. Dec 13 15:57:08.380487 systemd[1]: Created slice kubepods-besteffort-pod4b4ae775_3ac5_4022_a30e_f124eec91c0d.slice. Dec 13 15:57:08.390982 systemd[1]: Created slice kubepods-besteffort-podadadad57_fe17_4044_8f86_e95a257eba7f.slice. Dec 13 15:57:08.451496 kubelet[2064]: I1213 15:57:08.451450 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/adadad57-fe17-4044-8f86-e95a257eba7f-tigera-ca-bundle\") pod \"calico-kube-controllers-7f454bbfd7-km4k7\" (UID: \"adadad57-fe17-4044-8f86-e95a257eba7f\") " pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" Dec 13 15:57:08.451496 kubelet[2064]: I1213 15:57:08.451516 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cb8lq\" (UniqueName: \"kubernetes.io/projected/adadad57-fe17-4044-8f86-e95a257eba7f-kube-api-access-cb8lq\") pod \"calico-kube-controllers-7f454bbfd7-km4k7\" (UID: \"adadad57-fe17-4044-8f86-e95a257eba7f\") " pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" Dec 13 15:57:08.451821 kubelet[2064]: I1213 15:57:08.451553 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtpzf\" (UniqueName: \"kubernetes.io/projected/4b4ae775-3ac5-4022-a30e-f124eec91c0d-kube-api-access-qtpzf\") pod \"calico-apiserver-55c688fc-hrtkg\" (UID: \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\") " pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" Dec 13 15:57:08.451821 kubelet[2064]: I1213 15:57:08.451621 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5vtq\" (UniqueName: \"kubernetes.io/projected/91009ef9-d84c-4dac-b013-a8397dac44f7-kube-api-access-s5vtq\") pod \"calico-apiserver-55c688fc-6z2p6\" (UID: \"91009ef9-d84c-4dac-b013-a8397dac44f7\") " pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" Dec 13 15:57:08.451821 kubelet[2064]: I1213 15:57:08.451667 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/91009ef9-d84c-4dac-b013-a8397dac44f7-calico-apiserver-certs\") pod \"calico-apiserver-55c688fc-6z2p6\" (UID: \"91009ef9-d84c-4dac-b013-a8397dac44f7\") " pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" Dec 13 15:57:08.451821 kubelet[2064]: I1213 15:57:08.451715 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4b4ae775-3ac5-4022-a30e-f124eec91c0d-calico-apiserver-certs\") pod \"calico-apiserver-55c688fc-hrtkg\" (UID: \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\") " pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" Dec 13 15:57:08.679373 env[1203]: time="2024-12-13T15:57:08.678212599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-6z2p6,Uid:91009ef9-d84c-4dac-b013-a8397dac44f7,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:57:08.692645 env[1203]: time="2024-12-13T15:57:08.692555514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-hrtkg,Uid:4b4ae775-3ac5-4022-a30e-f124eec91c0d,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:57:08.715206 env[1203]: time="2024-12-13T15:57:08.715133945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f454bbfd7-km4k7,Uid:adadad57-fe17-4044-8f86-e95a257eba7f,Namespace:calico-system,Attempt:0,}" Dec 13 15:57:08.900834 env[1203]: time="2024-12-13T15:57:08.900690917Z" level=error msg="Failed to destroy network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.902673 env[1203]: time="2024-12-13T15:57:08.902624650Z" level=error msg="encountered an error cleaning up failed sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.902922 env[1203]: time="2024-12-13T15:57:08.902860656Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-6z2p6,Uid:91009ef9-d84c-4dac-b013-a8397dac44f7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.909884 kubelet[2064]: E1213 15:57:08.909573 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.909884 kubelet[2064]: E1213 15:57:08.909682 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" Dec 13 15:57:08.909884 kubelet[2064]: E1213 15:57:08.909722 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" Dec 13 15:57:08.912036 kubelet[2064]: E1213 15:57:08.909836 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55c688fc-6z2p6_calico-apiserver(91009ef9-d84c-4dac-b013-a8397dac44f7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55c688fc-6z2p6_calico-apiserver(91009ef9-d84c-4dac-b013-a8397dac44f7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" podUID="91009ef9-d84c-4dac-b013-a8397dac44f7" Dec 13 15:57:08.912375 env[1203]: time="2024-12-13T15:57:08.912327410Z" level=error msg="Failed to destroy network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.913136 env[1203]: time="2024-12-13T15:57:08.913088349Z" level=error msg="encountered an error cleaning up failed sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.913899 env[1203]: time="2024-12-13T15:57:08.913852806Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-hrtkg,Uid:4b4ae775-3ac5-4022-a30e-f124eec91c0d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.914797 kubelet[2064]: E1213 15:57:08.914295 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.914797 kubelet[2064]: E1213 15:57:08.914341 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" Dec 13 15:57:08.914797 kubelet[2064]: E1213 15:57:08.914380 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" Dec 13 15:57:08.915353 kubelet[2064]: E1213 15:57:08.914447 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55c688fc-hrtkg_calico-apiserver(4b4ae775-3ac5-4022-a30e-f124eec91c0d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55c688fc-hrtkg_calico-apiserver(4b4ae775-3ac5-4022-a30e-f124eec91c0d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" podUID="4b4ae775-3ac5-4022-a30e-f124eec91c0d" Dec 13 15:57:08.934939 env[1203]: time="2024-12-13T15:57:08.934785231Z" level=error msg="Failed to destroy network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.936129 env[1203]: time="2024-12-13T15:57:08.936068553Z" level=error msg="encountered an error cleaning up failed sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.936222 env[1203]: time="2024-12-13T15:57:08.936138782Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f454bbfd7-km4k7,Uid:adadad57-fe17-4044-8f86-e95a257eba7f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.936783 kubelet[2064]: E1213 15:57:08.936490 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:08.936783 kubelet[2064]: E1213 15:57:08.936553 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" Dec 13 15:57:08.936783 kubelet[2064]: E1213 15:57:08.936587 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" Dec 13 15:57:08.937941 kubelet[2064]: E1213 15:57:08.937887 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7f454bbfd7-km4k7_calico-system(adadad57-fe17-4044-8f86-e95a257eba7f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7f454bbfd7-km4k7_calico-system(adadad57-fe17-4044-8f86-e95a257eba7f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" podUID="adadad57-fe17-4044-8f86-e95a257eba7f" Dec 13 15:57:09.079877 systemd[1]: Created slice kubepods-besteffort-pod009bebc9_013c_4d7e_9ae4_7bb3c5895dc1.slice. Dec 13 15:57:09.084673 env[1203]: time="2024-12-13T15:57:09.084606182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cqqzv,Uid:009bebc9-013c-4d7e-9ae4-7bb3c5895dc1,Namespace:calico-system,Attempt:0,}" Dec 13 15:57:09.161617 env[1203]: time="2024-12-13T15:57:09.161541271Z" level=error msg="Failed to destroy network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.162125 env[1203]: time="2024-12-13T15:57:09.162061055Z" level=error msg="encountered an error cleaning up failed sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.162210 env[1203]: time="2024-12-13T15:57:09.162151416Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cqqzv,Uid:009bebc9-013c-4d7e-9ae4-7bb3c5895dc1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.164796 kubelet[2064]: E1213 15:57:09.162507 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.164796 kubelet[2064]: E1213 15:57:09.162582 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:57:09.164796 kubelet[2064]: E1213 15:57:09.162626 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cqqzv" Dec 13 15:57:09.165082 kubelet[2064]: E1213 15:57:09.162720 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-cqqzv_calico-system(009bebc9-013c-4d7e-9ae4-7bb3c5895dc1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-cqqzv_calico-system(009bebc9-013c-4d7e-9ae4-7bb3c5895dc1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:09.229585 kubelet[2064]: I1213 15:57:09.229348 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:09.233433 kubelet[2064]: I1213 15:57:09.233402 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:09.239458 env[1203]: time="2024-12-13T15:57:09.239411336Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:57:09.240573 env[1203]: time="2024-12-13T15:57:09.240084516Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:57:09.251400 kubelet[2064]: I1213 15:57:09.250589 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:09.251855 env[1203]: time="2024-12-13T15:57:09.251787077Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:57:09.260828 env[1203]: time="2024-12-13T15:57:09.260776242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:57:09.264809 kubelet[2064]: I1213 15:57:09.264289 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:09.265324 env[1203]: time="2024-12-13T15:57:09.265288070Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:57:09.342632 env[1203]: time="2024-12-13T15:57:09.342542140Z" level=error msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" failed" error="failed to destroy network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.343329 kubelet[2064]: E1213 15:57:09.343290 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:09.344791 kubelet[2064]: E1213 15:57:09.344761 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0"} Dec 13 15:57:09.344932 kubelet[2064]: E1213 15:57:09.344828 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adadad57-fe17-4044-8f86-e95a257eba7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:09.344932 kubelet[2064]: E1213 15:57:09.344871 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adadad57-fe17-4044-8f86-e95a257eba7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" podUID="adadad57-fe17-4044-8f86-e95a257eba7f" Dec 13 15:57:09.354904 env[1203]: time="2024-12-13T15:57:09.354834417Z" level=error msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" failed" error="failed to destroy network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.355386 kubelet[2064]: E1213 15:57:09.355341 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:09.355490 kubelet[2064]: E1213 15:57:09.355406 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1"} Dec 13 15:57:09.355490 kubelet[2064]: E1213 15:57:09.355453 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91009ef9-d84c-4dac-b013-a8397dac44f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:09.355647 kubelet[2064]: E1213 15:57:09.355506 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91009ef9-d84c-4dac-b013-a8397dac44f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" podUID="91009ef9-d84c-4dac-b013-a8397dac44f7" Dec 13 15:57:09.371379 env[1203]: time="2024-12-13T15:57:09.371305961Z" level=error msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" failed" error="failed to destroy network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.372206 kubelet[2064]: E1213 15:57:09.371970 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:09.372206 kubelet[2064]: E1213 15:57:09.372043 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3"} Dec 13 15:57:09.372206 kubelet[2064]: E1213 15:57:09.372114 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:09.372206 kubelet[2064]: E1213 15:57:09.372157 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" podUID="4b4ae775-3ac5-4022-a30e-f124eec91c0d" Dec 13 15:57:09.395847 env[1203]: time="2024-12-13T15:57:09.395776794Z" level=error msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" failed" error="failed to destroy network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:09.396697 kubelet[2064]: E1213 15:57:09.396415 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:09.396697 kubelet[2064]: E1213 15:57:09.396494 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb"} Dec 13 15:57:09.396697 kubelet[2064]: E1213 15:57:09.396573 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:09.396697 kubelet[2064]: E1213 15:57:09.396620 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:09.452886 kubelet[2064]: E1213 15:57:09.452823 2064 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 15:57:09.453126 kubelet[2064]: E1213 15:57:09.452991 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9-config-volume podName:9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9 nodeName:}" failed. No retries permitted until 2024-12-13 15:57:09.952943348 +0000 UTC m=+38.134213900 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9-config-volume") pod "coredns-76f75df574-8hlp5" (UID: "9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9") : failed to sync configmap cache: timed out waiting for the condition Dec 13 15:57:09.453300 kubelet[2064]: E1213 15:57:09.452825 2064 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 15:57:09.453442 kubelet[2064]: E1213 15:57:09.453322 2064 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/98935422-a7cb-4bf5-95dc-671007a56ae6-config-volume podName:98935422-a7cb-4bf5-95dc-671007a56ae6 nodeName:}" failed. No retries permitted until 2024-12-13 15:57:09.95330736 +0000 UTC m=+38.134577919 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/98935422-a7cb-4bf5-95dc-671007a56ae6-config-volume") pod "coredns-76f75df574-5tkdn" (UID: "98935422-a7cb-4bf5-95dc-671007a56ae6") : failed to sync configmap cache: timed out waiting for the condition Dec 13 15:57:10.152448 env[1203]: time="2024-12-13T15:57:10.152376049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-8hlp5,Uid:9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9,Namespace:kube-system,Attempt:0,}" Dec 13 15:57:10.172965 env[1203]: time="2024-12-13T15:57:10.172912994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5tkdn,Uid:98935422-a7cb-4bf5-95dc-671007a56ae6,Namespace:kube-system,Attempt:0,}" Dec 13 15:57:10.272198 env[1203]: time="2024-12-13T15:57:10.272124875Z" level=error msg="Failed to destroy network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.276156 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df-shm.mount: Deactivated successfully. Dec 13 15:57:10.277541 env[1203]: time="2024-12-13T15:57:10.273190657Z" level=error msg="encountered an error cleaning up failed sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.277839 env[1203]: time="2024-12-13T15:57:10.277688902Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-8hlp5,Uid:9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.279048 kubelet[2064]: E1213 15:57:10.278501 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.279048 kubelet[2064]: E1213 15:57:10.278583 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-8hlp5" Dec 13 15:57:10.279048 kubelet[2064]: E1213 15:57:10.278617 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-8hlp5" Dec 13 15:57:10.279302 kubelet[2064]: E1213 15:57:10.278686 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-8hlp5_kube-system(9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-8hlp5_kube-system(9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-8hlp5" podUID="9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9" Dec 13 15:57:10.301984 env[1203]: time="2024-12-13T15:57:10.301900638Z" level=error msg="Failed to destroy network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.304962 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc-shm.mount: Deactivated successfully. Dec 13 15:57:10.306472 env[1203]: time="2024-12-13T15:57:10.306423756Z" level=error msg="encountered an error cleaning up failed sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.306579 env[1203]: time="2024-12-13T15:57:10.306498632Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5tkdn,Uid:98935422-a7cb-4bf5-95dc-671007a56ae6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.307600 kubelet[2064]: E1213 15:57:10.306951 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:10.307600 kubelet[2064]: E1213 15:57:10.307045 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5tkdn" Dec 13 15:57:10.307600 kubelet[2064]: E1213 15:57:10.307079 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5tkdn" Dec 13 15:57:10.307860 kubelet[2064]: E1213 15:57:10.307217 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-5tkdn_kube-system(98935422-a7cb-4bf5-95dc-671007a56ae6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-5tkdn_kube-system(98935422-a7cb-4bf5-95dc-671007a56ae6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5tkdn" podUID="98935422-a7cb-4bf5-95dc-671007a56ae6" Dec 13 15:57:11.278091 kubelet[2064]: I1213 15:57:11.277847 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:11.280297 env[1203]: time="2024-12-13T15:57:11.279686300Z" level=info msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" Dec 13 15:57:11.294819 kubelet[2064]: I1213 15:57:11.294507 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:11.295957 env[1203]: time="2024-12-13T15:57:11.295872184Z" level=info msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" Dec 13 15:57:11.351730 env[1203]: time="2024-12-13T15:57:11.351651631Z" level=error msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" failed" error="failed to destroy network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:11.352610 kubelet[2064]: E1213 15:57:11.352313 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:11.352610 kubelet[2064]: E1213 15:57:11.352396 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc"} Dec 13 15:57:11.352610 kubelet[2064]: E1213 15:57:11.352499 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"98935422-a7cb-4bf5-95dc-671007a56ae6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:11.352610 kubelet[2064]: E1213 15:57:11.352561 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"98935422-a7cb-4bf5-95dc-671007a56ae6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5tkdn" podUID="98935422-a7cb-4bf5-95dc-671007a56ae6" Dec 13 15:57:11.365079 env[1203]: time="2024-12-13T15:57:11.365013304Z" level=error msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" failed" error="failed to destroy network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:11.365801 kubelet[2064]: E1213 15:57:11.365503 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:11.365801 kubelet[2064]: E1213 15:57:11.365607 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df"} Dec 13 15:57:11.365801 kubelet[2064]: E1213 15:57:11.365665 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:11.365801 kubelet[2064]: E1213 15:57:11.365727 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-8hlp5" podUID="9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9" Dec 13 15:57:20.076687 env[1203]: time="2024-12-13T15:57:20.075483124Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:57:20.090862 env[1203]: time="2024-12-13T15:57:20.090813776Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:57:20.183771 env[1203]: time="2024-12-13T15:57:20.183668206Z" level=error msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" failed" error="failed to destroy network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:20.184351 kubelet[2064]: E1213 15:57:20.184047 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:20.184351 kubelet[2064]: E1213 15:57:20.184120 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3"} Dec 13 15:57:20.184351 kubelet[2064]: E1213 15:57:20.184177 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:20.184351 kubelet[2064]: E1213 15:57:20.184218 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b4ae775-3ac5-4022-a30e-f124eec91c0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" podUID="4b4ae775-3ac5-4022-a30e-f124eec91c0d" Dec 13 15:57:20.201827 env[1203]: time="2024-12-13T15:57:20.201764536Z" level=error msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" failed" error="failed to destroy network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:20.202358 kubelet[2064]: E1213 15:57:20.202316 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:20.202821 kubelet[2064]: E1213 15:57:20.202396 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0"} Dec 13 15:57:20.202821 kubelet[2064]: E1213 15:57:20.202450 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adadad57-fe17-4044-8f86-e95a257eba7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:20.202821 kubelet[2064]: E1213 15:57:20.202511 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adadad57-fe17-4044-8f86-e95a257eba7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" podUID="adadad57-fe17-4044-8f86-e95a257eba7f" Dec 13 15:57:21.030279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount858233551.mount: Deactivated successfully. Dec 13 15:57:21.075034 env[1203]: time="2024-12-13T15:57:21.074978284Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:57:21.090911 env[1203]: time="2024-12-13T15:57:21.090788172Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:57:21.094164 env[1203]: time="2024-12-13T15:57:21.094099890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:21.097476 env[1203]: time="2024-12-13T15:57:21.097433835Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:21.100025 env[1203]: time="2024-12-13T15:57:21.099986209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:21.102850 env[1203]: time="2024-12-13T15:57:21.102812566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:21.103333 env[1203]: time="2024-12-13T15:57:21.103294773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:57:21.158616 env[1203]: time="2024-12-13T15:57:21.158559714Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:57:21.175688 env[1203]: time="2024-12-13T15:57:21.175611205Z" level=error msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" failed" error="failed to destroy network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:21.175996 kubelet[2064]: E1213 15:57:21.175918 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:21.175996 kubelet[2064]: E1213 15:57:21.175982 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb"} Dec 13 15:57:21.176194 kubelet[2064]: E1213 15:57:21.176048 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:21.176194 kubelet[2064]: E1213 15:57:21.176092 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cqqzv" podUID="009bebc9-013c-4d7e-9ae4-7bb3c5895dc1" Dec 13 15:57:21.186599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2605463552.mount: Deactivated successfully. Dec 13 15:57:21.193082 env[1203]: time="2024-12-13T15:57:21.193036698Z" level=info msg="CreateContainer within sandbox \"332cd04f4fd3058334ccae8e653c6649feeea119b84f6d11e28c64c614b09c28\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d\"" Dec 13 15:57:21.195390 env[1203]: time="2024-12-13T15:57:21.194004442Z" level=info msg="StartContainer for \"6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d\"" Dec 13 15:57:21.206341 env[1203]: time="2024-12-13T15:57:21.206280083Z" level=error msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" failed" error="failed to destroy network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:57:21.206780 kubelet[2064]: E1213 15:57:21.206707 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:21.207240 kubelet[2064]: E1213 15:57:21.206802 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1"} Dec 13 15:57:21.207240 kubelet[2064]: E1213 15:57:21.206873 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91009ef9-d84c-4dac-b013-a8397dac44f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:57:21.207240 kubelet[2064]: E1213 15:57:21.206948 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91009ef9-d84c-4dac-b013-a8397dac44f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" podUID="91009ef9-d84c-4dac-b013-a8397dac44f7" Dec 13 15:57:21.226077 systemd[1]: Started cri-containerd-6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d.scope. Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.273645 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 15:57:21.278703 kernel: audit: type=1400 audit(1734105441.266:1024): avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f22c3e274f8 items=0 ppid=2513 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633665313430666339356233353439323636636231643836363061 Dec 13 15:57:21.305906 kernel: audit: type=1300 audit(1734105441.266:1024): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f22c3e274f8 items=0 ppid=2513 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.306002 kernel: audit: type=1327 audit(1734105441.266:1024): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633665313430666339356233353439323636636231643836363061 Dec 13 15:57:21.306054 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.306107 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.306171 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.310961 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.321313 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.326581 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.326695 kernel: audit: type=1400 audit(1734105441.266:1025): avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.266000 audit: BPF prog-id=139 op=LOAD Dec 13 15:57:21.266000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c7f08 items=0 ppid=2513 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633665313430666339356233353439323636636231643836363061 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit: BPF prog-id=140 op=LOAD Dec 13 15:57:21.277000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002c7f58 items=0 ppid=2513 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633665313430666339356233353439323636636231643836363061 Dec 13 15:57:21.277000 audit: BPF prog-id=140 op=UNLOAD Dec 13 15:57:21.277000 audit: BPF prog-id=139 op=UNLOAD Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:21.277000 audit: BPF prog-id=141 op=LOAD Dec 13 15:57:21.277000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002c7fe8 items=0 ppid=2513 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633665313430666339356233353439323636636231643836363061 Dec 13 15:57:21.346838 env[1203]: time="2024-12-13T15:57:21.342252901Z" level=info msg="StartContainer for \"6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d\" returns successfully" Dec 13 15:57:21.810618 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:57:21.811076 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:57:22.405357 systemd[1]: run-containerd-runc-k8s.io-6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d-runc.pjR27g.mount: Deactivated successfully. Dec 13 15:57:23.072994 env[1203]: time="2024-12-13T15:57:23.072928243Z" level=info msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" Dec 13 15:57:23.167666 kubelet[2064]: I1213 15:57:23.167613 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-t2vxj" podStartSLOduration=3.337550718 podStartE2EDuration="31.162005162s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:56:53.27986538 +0000 UTC m=+21.461135937" lastFinishedPulling="2024-12-13 15:57:21.10431982 +0000 UTC m=+49.285590381" observedRunningTime="2024-12-13 15:57:22.378357625 +0000 UTC m=+50.559628195" watchObservedRunningTime="2024-12-13 15:57:23.162005162 +0000 UTC m=+51.343275738" Dec 13 15:57:23.384238 systemd[1]: run-containerd-runc-k8s.io-6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d-runc.HNmMAi.mount: Deactivated successfully. Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.161 [INFO][3309] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.161 [INFO][3309] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" iface="eth0" netns="/var/run/netns/cni-587a259f-c4d3-9001-7965-c2b1ca3302fb" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.161 [INFO][3309] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" iface="eth0" netns="/var/run/netns/cni-587a259f-c4d3-9001-7965-c2b1ca3302fb" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.164 [INFO][3309] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" iface="eth0" netns="/var/run/netns/cni-587a259f-c4d3-9001-7965-c2b1ca3302fb" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.164 [INFO][3309] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.164 [INFO][3309] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.338 [INFO][3315] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.345 [INFO][3315] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.345 [INFO][3315] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.367 [WARNING][3315] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.367 [INFO][3315] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.371 [INFO][3315] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:23.392780 env[1203]: 2024-12-13 15:57:23.373 [INFO][3309] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:23.395830 systemd[1]: run-netns-cni\x2d587a259f\x2dc4d3\x2d9001\x2d7965\x2dc2b1ca3302fb.mount: Deactivated successfully. Dec 13 15:57:23.399189 env[1203]: time="2024-12-13T15:57:23.399128679Z" level=info msg="TearDown network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" successfully" Dec 13 15:57:23.399352 env[1203]: time="2024-12-13T15:57:23.399318537Z" level=info msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" returns successfully" Dec 13 15:57:23.401542 env[1203]: time="2024-12-13T15:57:23.401468955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5tkdn,Uid:98935422-a7cb-4bf5-95dc-671007a56ae6,Namespace:kube-system,Attempt:1,}" Dec 13 15:57:23.470000 audit[3375]: AVC avc: denied { write } for pid=3375 comm="tee" name="fd" dev="proc" ino=30028 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.470000 audit[3375]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff007b6a02 a2=241 a3=1b6 items=1 ppid=3329 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.470000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:57:23.470000 audit: PATH item=0 name="/dev/fd/63" inode=30025 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.470000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.611000 audit[3396]: AVC avc: denied { write } for pid=3396 comm="tee" name="fd" dev="proc" ino=29418 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.611000 audit[3396]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd18e9fa04 a2=241 a3=1b6 items=1 ppid=3350 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.611000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:57:23.611000 audit: PATH item=0 name="/dev/fd/63" inode=29398 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.668289 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:57:23.668457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05c9c4b6615: link becomes ready Dec 13 15:57:23.673212 systemd-networkd[1018]: cali05c9c4b6615: Link UP Dec 13 15:57:23.681995 systemd-networkd[1018]: cali05c9c4b6615: Gained carrier Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.482 [INFO][3360] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.500 [INFO][3360] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0 coredns-76f75df574- kube-system 98935422-a7cb-4bf5-95dc-671007a56ae6 777 0 2024-12-13 15:56:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com coredns-76f75df574-5tkdn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali05c9c4b6615 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.500 [INFO][3360] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.572 [INFO][3391] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" HandleID="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.587 [INFO][3391] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" HandleID="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b52e0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"coredns-76f75df574-5tkdn", "timestamp":"2024-12-13 15:57:23.572795615 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.587 [INFO][3391] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.587 [INFO][3391] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.588 [INFO][3391] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.591 [INFO][3391] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.601 [INFO][3391] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.611 [INFO][3391] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.617 [INFO][3391] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.621 [INFO][3391] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.621 [INFO][3391] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.623 [INFO][3391] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.630 [INFO][3391] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.639 [INFO][3391] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.193/26] block=192.168.93.192/26 handle="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.640 [INFO][3391] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.193/26] handle="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.640 [INFO][3391] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:23.708944 env[1203]: 2024-12-13 15:57:23.640 [INFO][3391] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.193/26] IPv6=[] ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" HandleID="k8s-pod-network.1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.644 [INFO][3360] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"98935422-a7cb-4bf5-95dc-671007a56ae6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-5tkdn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05c9c4b6615", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.644 [INFO][3360] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.193/32] ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.644 [INFO][3360] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali05c9c4b6615 ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.672 [INFO][3360] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.672 [INFO][3360] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"98935422-a7cb-4bf5-95dc-671007a56ae6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab", Pod:"coredns-76f75df574-5tkdn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05c9c4b6615", MAC:"56:d6:21:6d:3e:c8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:23.714684 env[1203]: 2024-12-13 15:57:23.703 [INFO][3360] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab" Namespace="kube-system" Pod="coredns-76f75df574-5tkdn" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:23.746000 audit[3439]: AVC avc: denied { write } for pid=3439 comm="tee" name="fd" dev="proc" ino=30069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.746000 audit[3439]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc88519f2 a2=241 a3=1b6 items=1 ppid=3332 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.746000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:57:23.746000 audit: PATH item=0 name="/dev/fd/63" inode=29487 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.746000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.763483 env[1203]: time="2024-12-13T15:57:23.763351515Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:23.763768 env[1203]: time="2024-12-13T15:57:23.763446423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:23.763768 env[1203]: time="2024-12-13T15:57:23.763519242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:23.763976 env[1203]: time="2024-12-13T15:57:23.763720342Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab pid=3454 runtime=io.containerd.runc.v2 Dec 13 15:57:23.783752 systemd[1]: Started cri-containerd-1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab.scope. Dec 13 15:57:23.778000 audit[3416]: AVC avc: denied { write } for pid=3416 comm="tee" name="fd" dev="proc" ino=29495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.778000 audit[3416]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd23f9a02 a2=241 a3=1b6 items=1 ppid=3334 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.778000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:57:23.778000 audit: PATH item=0 name="/dev/fd/63" inode=29440 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.816000 audit[3444]: AVC avc: denied { write } for pid=3444 comm="tee" name="fd" dev="proc" ino=30134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.819000 audit[3430]: AVC avc: denied { write } for pid=3430 comm="tee" name="fd" dev="proc" ino=30136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.819000 audit[3430]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe109119f3 a2=241 a3=1b6 items=1 ppid=3331 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.819000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:57:23.819000 audit: PATH item=0 name="/dev/fd/63" inode=29485 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.816000 audit[3444]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaa18aa02 a2=241 a3=1b6 items=1 ppid=3358 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.816000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:57:23.816000 audit: PATH item=0 name="/dev/fd/63" inode=29490 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit: BPF prog-id=142 op=LOAD Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3454 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363361323339333035616433313832323939633862646166383563 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3454 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363361323339333035616433313832323939633862646166383563 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.859000 audit: BPF prog-id=143 op=LOAD Dec 13 15:57:23.859000 audit[3464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038a7e0 items=0 ppid=3454 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363361323339333035616433313832323939633862646166383563 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit: BPF prog-id=144 op=LOAD Dec 13 15:57:23.860000 audit[3464]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038a828 items=0 ppid=3454 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363361323339333035616433313832323939633862646166383563 Dec 13 15:57:23.860000 audit: BPF prog-id=144 op=UNLOAD Dec 13 15:57:23.860000 audit: BPF prog-id=143 op=UNLOAD Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { perfmon } for pid=3464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit[3464]: AVC avc: denied { bpf } for pid=3464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:23.860000 audit: BPF prog-id=145 op=LOAD Dec 13 15:57:23.860000 audit[3464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038ac38 items=0 ppid=3454 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164363361323339333035616433313832323939633862646166383563 Dec 13 15:57:23.875000 audit[3446]: AVC avc: denied { write } for pid=3446 comm="tee" name="fd" dev="proc" ino=29536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:57:23.778000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.931238 env[1203]: time="2024-12-13T15:57:23.931164587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5tkdn,Uid:98935422-a7cb-4bf5-95dc-671007a56ae6,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab\"" Dec 13 15:57:23.875000 audit[3446]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff10f7a03 a2=241 a3=1b6 items=1 ppid=3348 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:23.875000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:57:23.875000 audit: PATH item=0 name="/dev/fd/63" inode=29491 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:57:23.875000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:57:23.936264 env[1203]: time="2024-12-13T15:57:23.934994845Z" level=info msg="CreateContainer within sandbox \"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:57:23.951700 env[1203]: time="2024-12-13T15:57:23.951627307Z" level=info msg="CreateContainer within sandbox \"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e9f42c3b30cdcfeda91e15ee0f6b2cb7d1cf102c53361351cc21e5272faae5b1\"" Dec 13 15:57:23.952844 env[1203]: time="2024-12-13T15:57:23.952769688Z" level=info msg="StartContainer for \"e9f42c3b30cdcfeda91e15ee0f6b2cb7d1cf102c53361351cc21e5272faae5b1\"" Dec 13 15:57:23.987279 systemd[1]: Started cri-containerd-e9f42c3b30cdcfeda91e15ee0f6b2cb7d1cf102c53361351cc21e5272faae5b1.scope. Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.036000 audit: BPF prog-id=146 op=LOAD Dec 13 15:57:24.038000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.038000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3454 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663432633362333063646366656461393165313565653066366232 Dec 13 15:57:24.038000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.038000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3454 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663432633362333063646366656461393165313565653066366232 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.039000 audit: BPF prog-id=147 op=LOAD Dec 13 15:57:24.039000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000298880 items=0 ppid=3454 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663432633362333063646366656461393165313565653066366232 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.041000 audit: BPF prog-id=148 op=LOAD Dec 13 15:57:24.041000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002988c8 items=0 ppid=3454 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663432633362333063646366656461393165313565653066366232 Dec 13 15:57:24.042000 audit: BPF prog-id=148 op=UNLOAD Dec 13 15:57:24.043000 audit: BPF prog-id=147 op=UNLOAD Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.043000 audit: BPF prog-id=149 op=LOAD Dec 13 15:57:24.043000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000298cd8 items=0 ppid=3454 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663432633362333063646366656461393165313565653066366232 Dec 13 15:57:24.070428 env[1203]: time="2024-12-13T15:57:24.070374200Z" level=info msg="StartContainer for \"e9f42c3b30cdcfeda91e15ee0f6b2cb7d1cf102c53361351cc21e5272faae5b1\" returns successfully" Dec 13 15:57:24.414399 kubelet[2064]: I1213 15:57:24.414338 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-5tkdn" podStartSLOduration=40.414261544 podStartE2EDuration="40.414261544s" podCreationTimestamp="2024-12-13 15:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:57:24.408507495 +0000 UTC m=+52.589778062" watchObservedRunningTime="2024-12-13 15:57:24.414261544 +0000 UTC m=+52.595532108" Dec 13 15:57:24.513000 audit[3561]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:24.513000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc8a18d7c0 a2=0 a3=7ffc8a18d7ac items=0 ppid=2245 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:24.520000 audit[3561]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:24.520000 audit[3561]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc8a18d7c0 a2=0 a3=0 items=0 ppid=2245 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.605000 audit: BPF prog-id=150 op=LOAD Dec 13 15:57:24.605000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef34e66e0 a2=98 a3=3 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.606000 audit: BPF prog-id=150 op=UNLOAD Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.606000 audit: BPF prog-id=151 op=LOAD Dec 13 15:57:24.606000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef34e64c0 a2=74 a3=540051 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.606000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.607000 audit: BPF prog-id=151 op=UNLOAD Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.607000 audit: BPF prog-id=152 op=LOAD Dec 13 15:57:24.607000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef34e64f0 a2=94 a3=2 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.607000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.607000 audit: BPF prog-id=152 op=UNLOAD Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.792000 audit: BPF prog-id=153 op=LOAD Dec 13 15:57:24.792000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef34e63b0 a2=40 a3=1 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.792000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.793000 audit: BPF prog-id=153 op=UNLOAD Dec 13 15:57:24.793000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.793000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef34e6480 a2=50 a3=7ffef34e6560 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.793000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e63c0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef34e63f0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef34e6300 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e6410 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e63f0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.807000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.807000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e63e0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.808000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.808000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e6410 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.808000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.808000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef34e63f0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.808000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.808000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef34e6410 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef34e63e0 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef34e6450 a2=28 a3=0 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef34e6200 a2=50 a3=1 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.809000 audit: BPF prog-id=154 op=LOAD Dec 13 15:57:24.809000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef34e6200 a2=94 a3=5 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.810000 audit: BPF prog-id=154 op=UNLOAD Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef34e62b0 a2=50 a3=1 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef34e63d0 a2=4 a3=38 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { confidentiality } for pid=3593 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:24.810000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef34e6420 a2=94 a3=6 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { confidentiality } for pid=3593 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:24.810000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef34e5bd0 a2=94 a3=83 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { perfmon } for pid=3593 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { bpf } for pid=3593 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.810000 audit[3593]: AVC avc: denied { confidentiality } for pid=3593 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:24.810000 audit[3593]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef34e5bd0 a2=94 a3=83 items=0 ppid=3330 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.824000 audit: BPF prog-id=155 op=LOAD Dec 13 15:57:24.824000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe69ec4e0 a2=98 a3=1999999999999999 items=0 ppid=3330 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.824000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:57:24.825000 audit: BPF prog-id=155 op=UNLOAD Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.826000 audit: BPF prog-id=156 op=LOAD Dec 13 15:57:24.826000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe69ec3c0 a2=74 a3=ffff items=0 ppid=3330 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:57:24.827000 audit: BPF prog-id=156 op=UNLOAD Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { perfmon } for pid=3598 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit[3598]: AVC avc: denied { bpf } for pid=3598 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.827000 audit: BPF prog-id=157 op=LOAD Dec 13 15:57:24.827000 audit[3598]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe69ec400 a2=40 a3=7fffe69ec5e0 items=0 ppid=3330 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.827000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:57:24.828000 audit: BPF prog-id=157 op=UNLOAD Dec 13 15:57:24.919349 systemd-networkd[1018]: vxlan.calico: Link UP Dec 13 15:57:24.919365 systemd-networkd[1018]: vxlan.calico: Gained carrier Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.976000 audit: BPF prog-id=158 op=LOAD Dec 13 15:57:24.976000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7a9f5f60 a2=98 a3=100 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.976000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.980000 audit: BPF prog-id=158 op=UNLOAD Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.980000 audit: BPF prog-id=159 op=LOAD Dec 13 15:57:24.980000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7a9f5d70 a2=74 a3=540051 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.987000 audit: BPF prog-id=159 op=UNLOAD Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.987000 audit: BPF prog-id=160 op=LOAD Dec 13 15:57:24.987000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7a9f5da0 a2=94 a3=2 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.989000 audit: BPF prog-id=160 op=UNLOAD Dec 13 15:57:24.989000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.989000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5c70 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.989000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.989000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7a9f5ca0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.990000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.990000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7a9f5bb0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.990000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.990000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5cc0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.991000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.991000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5ca0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.991000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.991000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.991000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5c90 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.991000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:24.992000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:24.992000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5cc0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:24.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7a9f5ca0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7a9f5cc0 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7a9f5c90 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe7a9f5d00 a2=28 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.001000 audit: BPF prog-id=161 op=LOAD Dec 13 15:57:25.001000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7a9f5b70 a2=40 a3=0 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.001000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.001000 audit: BPF prog-id=161 op=UNLOAD Dec 13 15:57:25.003000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.003000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe7a9f5b60 a2=50 a3=2800 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.003000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.005000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.005000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe7a9f5b60 a2=50 a3=2800 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.006000 audit: BPF prog-id=162 op=LOAD Dec 13 15:57:25.006000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7a9f5380 a2=94 a3=2 items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.006000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.008000 audit: BPF prog-id=162 op=UNLOAD Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.008000 audit: BPF prog-id=163 op=LOAD Dec 13 15:57:25.008000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7a9f5480 a2=94 a3=2d items=0 ppid=3330 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.008000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.017000 audit: BPF prog-id=164 op=LOAD Dec 13 15:57:25.017000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf4c54a70 a2=98 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.017000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.019000 audit: BPF prog-id=164 op=UNLOAD Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.019000 audit: BPF prog-id=165 op=LOAD Dec 13 15:57:25.019000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf4c54850 a2=74 a3=540051 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.020000 audit: BPF prog-id=165 op=UNLOAD Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.020000 audit: BPF prog-id=166 op=LOAD Dec 13 15:57:25.020000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf4c54880 a2=94 a3=2 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.022000 audit: BPF prog-id=166 op=UNLOAD Dec 13 15:57:25.072901 env[1203]: time="2024-12-13T15:57:25.072680963Z" level=info msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" Dec 13 15:57:25.152288 systemd-networkd[1018]: cali05c9c4b6615: Gained IPv6LL Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit: BPF prog-id=167 op=LOAD Dec 13 15:57:25.259000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf4c54740 a2=40 a3=1 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.259000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.259000 audit: BPF prog-id=167 op=UNLOAD Dec 13 15:57:25.259000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.259000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcf4c54810 a2=50 a3=7ffcf4c548f0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.259000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.186 [INFO][3655] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.186 [INFO][3655] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" iface="eth0" netns="/var/run/netns/cni-da99df26-7386-0926-4c59-c0c60f574793" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.187 [INFO][3655] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" iface="eth0" netns="/var/run/netns/cni-da99df26-7386-0926-4c59-c0c60f574793" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.187 [INFO][3655] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" iface="eth0" netns="/var/run/netns/cni-da99df26-7386-0926-4c59-c0c60f574793" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.187 [INFO][3655] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.187 [INFO][3655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.248 [INFO][3661] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.248 [INFO][3661] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.248 [INFO][3661] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.258 [WARNING][3661] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.258 [INFO][3661] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.262 [INFO][3661] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:25.268093 env[1203]: 2024-12-13 15:57:25.265 [INFO][3655] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c54750 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf4c54780 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf4c54690 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c547a0 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c54780 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c54770 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c547a0 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf4c54780 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf4c547a0 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf4c54770 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf4c547e0 a2=28 a3=0 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf4c54590 a2=50 a3=1 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit: BPF prog-id=168 op=LOAD Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf4c54590 a2=94 a3=5 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit: BPF prog-id=168 op=UNLOAD Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf4c54640 a2=50 a3=1 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.276000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.276000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcf4c54760 a2=4 a3=38 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.276000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { confidentiality } for pid=3639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:25.277000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf4c547b0 a2=94 a3=6 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { confidentiality } for pid=3639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:25.277000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf4c53f60 a2=94 a3=83 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { confidentiality } for pid=3639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:57:25.277000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf4c53f60 a2=94 a3=83 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.277000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.277000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf4c559a0 a2=10 a3=f1f00800 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.278000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.278000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf4c55840 a2=10 a3=3 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.278000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.278000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf4c557e0 a2=10 a3=3 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.278000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.278000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf4c557e0 a2=10 a3=7 items=0 ppid=3330 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:57:25.287851 env[1203]: time="2024-12-13T15:57:25.271169263Z" level=info msg="TearDown network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" successfully" Dec 13 15:57:25.287851 env[1203]: time="2024-12-13T15:57:25.271224061Z" level=info msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" returns successfully" Dec 13 15:57:25.287851 env[1203]: time="2024-12-13T15:57:25.284105318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-8hlp5,Uid:9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9,Namespace:kube-system,Attempt:1,}" Dec 13 15:57:25.272871 systemd[1]: run-netns-cni\x2dda99df26\x2d7386\x2d0926\x2d4c59\x2dc0c60f574793.mount: Deactivated successfully. Dec 13 15:57:25.296000 audit: BPF prog-id=163 op=UNLOAD Dec 13 15:57:25.446000 audit[3693]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:25.446000 audit[3693]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde327d370 a2=0 a3=7ffde327d35c items=0 ppid=2245 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:25.453000 audit[3693]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:25.453000 audit[3693]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde327d370 a2=0 a3=7ffde327d35c items=0 ppid=2245 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:25.544158 systemd-networkd[1018]: cali83a182e0b5a: Link UP Dec 13 15:57:25.554561 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali83a182e0b5a: link becomes ready Dec 13 15:57:25.550994 systemd-networkd[1018]: cali83a182e0b5a: Gained carrier Dec 13 15:57:25.559000 audit[3714]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:25.559000 audit[3714]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffecce08c80 a2=0 a3=7ffecce08c6c items=0 ppid=3330 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:25.593000 audit[3712]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:25.593000 audit[3712]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcdbc3a1e0 a2=0 a3=7ffcdbc3a1cc items=0 ppid=3330 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.593000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:25.609000 audit[3713]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3713 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.396 [INFO][3669] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0 coredns-76f75df574- kube-system 9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9 794 0 2024-12-13 15:56:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com coredns-76f75df574-8hlp5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali83a182e0b5a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.396 [INFO][3669] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.475 [INFO][3687] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" HandleID="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.492 [INFO][3687] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" HandleID="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bd430), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"coredns-76f75df574-8hlp5", "timestamp":"2024-12-13 15:57:25.475316961 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.493 [INFO][3687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.493 [INFO][3687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.493 [INFO][3687] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.496 [INFO][3687] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.503 [INFO][3687] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.510 [INFO][3687] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.514 [INFO][3687] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.517 [INFO][3687] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.517 [INFO][3687] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.520 [INFO][3687] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94 Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.526 [INFO][3687] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.535 [INFO][3687] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.194/26] block=192.168.93.192/26 handle="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.535 [INFO][3687] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.194/26] handle="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.535 [INFO][3687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:25.610858 env[1203]: 2024-12-13 15:57:25.535 [INFO][3687] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.194/26] IPv6=[] ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" HandleID="k8s-pod-network.6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.537 [INFO][3669] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-8hlp5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali83a182e0b5a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.538 [INFO][3669] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.194/32] ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.538 [INFO][3669] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali83a182e0b5a ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.563 [INFO][3669] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.564 [INFO][3669] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94", Pod:"coredns-76f75df574-8hlp5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali83a182e0b5a", MAC:"ba:47:3f:a3:bf:20", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:25.612255 env[1203]: 2024-12-13 15:57:25.605 [INFO][3669] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94" Namespace="kube-system" Pod="coredns-76f75df574-8hlp5" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:25.609000 audit[3713]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffee7c5bd20 a2=0 a3=7ffee7c5bd0c items=0 ppid=3330 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.609000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:25.614000 audit[3719]: NETFILTER_CFG table=filter:104 family=2 entries=69 op=nft_register_chain pid=3719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:25.614000 audit[3719]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffd35c90700 a2=0 a3=7ffd35c906ec items=0 ppid=3330 pid=3719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.614000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:25.642102 env[1203]: time="2024-12-13T15:57:25.641967563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:25.642368 env[1203]: time="2024-12-13T15:57:25.642321172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:25.642538 env[1203]: time="2024-12-13T15:57:25.642483264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:25.643404 env[1203]: time="2024-12-13T15:57:25.643161724Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94 pid=3740 runtime=io.containerd.runc.v2 Dec 13 15:57:25.683966 systemd[1]: run-containerd-runc-k8s.io-6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94-runc.VtSU8q.mount: Deactivated successfully. Dec 13 15:57:25.692579 systemd[1]: Started cri-containerd-6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94.scope. Dec 13 15:57:25.695000 audit[3764]: NETFILTER_CFG table=filter:105 family=2 entries=30 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:25.695000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffde3270d30 a2=0 a3=7ffde3270d1c items=0 ppid=3330 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.695000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.723000 audit: BPF prog-id=169 op=LOAD Dec 13 15:57:25.724000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.724000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3740 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664616233323435353634613665666534343231646234393933346563 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3740 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664616233323435353634613665666534343231646234393933346563 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.725000 audit: BPF prog-id=170 op=LOAD Dec 13 15:57:25.725000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034c5d0 items=0 ppid=3740 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664616233323435353634613665666534343231646234393933346563 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.726000 audit: BPF prog-id=171 op=LOAD Dec 13 15:57:25.726000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034c618 items=0 ppid=3740 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664616233323435353634613665666534343231646234393933346563 Dec 13 15:57:25.727000 audit: BPF prog-id=171 op=UNLOAD Dec 13 15:57:25.728000 audit: BPF prog-id=170 op=UNLOAD Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.728000 audit: BPF prog-id=172 op=LOAD Dec 13 15:57:25.728000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034ca28 items=0 ppid=3740 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664616233323435353634613665666534343231646234393933346563 Dec 13 15:57:25.771580 env[1203]: time="2024-12-13T15:57:25.771488011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-8hlp5,Uid:9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9,Namespace:kube-system,Attempt:1,} returns sandbox id \"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94\"" Dec 13 15:57:25.777864 env[1203]: time="2024-12-13T15:57:25.777823177Z" level=info msg="CreateContainer within sandbox \"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:57:25.798120 env[1203]: time="2024-12-13T15:57:25.798013045Z" level=info msg="CreateContainer within sandbox \"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a5f8bf35211803b15929b0db04cd75ee856f6f4208d3043a8670ea612f847525\"" Dec 13 15:57:25.799678 env[1203]: time="2024-12-13T15:57:25.798811648Z" level=info msg="StartContainer for \"a5f8bf35211803b15929b0db04cd75ee856f6f4208d3043a8670ea612f847525\"" Dec 13 15:57:25.824333 systemd[1]: Started cri-containerd-a5f8bf35211803b15929b0db04cd75ee856f6f4208d3043a8670ea612f847525.scope. Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.851000 audit: BPF prog-id=173 op=LOAD Dec 13 15:57:25.853000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.853000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3740 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663862663335323131383033623135393239623064623034636437 Dec 13 15:57:25.853000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.853000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3740 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663862663335323131383033623135393239623064623034636437 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.854000 audit: BPF prog-id=174 op=LOAD Dec 13 15:57:25.854000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003becb0 items=0 ppid=3740 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663862663335323131383033623135393239623064623034636437 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.855000 audit: BPF prog-id=175 op=LOAD Dec 13 15:57:25.855000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003becf8 items=0 ppid=3740 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663862663335323131383033623135393239623064623034636437 Dec 13 15:57:25.856000 audit: BPF prog-id=175 op=UNLOAD Dec 13 15:57:25.857000 audit: BPF prog-id=174 op=UNLOAD Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:25.857000 audit: BPF prog-id=176 op=LOAD Dec 13 15:57:25.857000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003bf108 items=0 ppid=3740 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:25.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663862663335323131383033623135393239623064623034636437 Dec 13 15:57:25.878199 env[1203]: time="2024-12-13T15:57:25.878137932Z" level=info msg="StartContainer for \"a5f8bf35211803b15929b0db04cd75ee856f6f4208d3043a8670ea612f847525\" returns successfully" Dec 13 15:57:26.397128 kubelet[2064]: I1213 15:57:26.397077 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-8hlp5" podStartSLOduration=42.397000857 podStartE2EDuration="42.397000857s" podCreationTimestamp="2024-12-13 15:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:57:26.39591189 +0000 UTC m=+54.577182474" watchObservedRunningTime="2024-12-13 15:57:26.397000857 +0000 UTC m=+54.578271414" Dec 13 15:57:26.442784 kernel: kauditd_printk_skb: 791 callbacks suppressed Dec 13 15:57:26.442995 kernel: audit: type=1325 audit(1734105446.439:1209): table=filter:106 family=2 entries=10 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.439000 audit[3818]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.439000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe8ec4adf0 a2=0 a3=7ffe8ec4addc items=0 ppid=2245 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.452941 kernel: audit: type=1300 audit(1734105446.439:1209): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe8ec4adf0 a2=0 a3=7ffe8ec4addc items=0 ppid=2245 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.456787 kernel: audit: type=1327 audit(1734105446.439:1209): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.456928 kernel: audit: type=1325 audit(1734105446.454:1210): table=nat:107 family=2 entries=44 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.454000 audit[3818]: NETFILTER_CFG table=nat:107 family=2 entries=44 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.454000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe8ec4adf0 a2=0 a3=7ffe8ec4addc items=0 ppid=2245 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.469013 kernel: audit: type=1300 audit(1734105446.454:1210): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe8ec4adf0 a2=0 a3=7ffe8ec4addc items=0 ppid=2245 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.472990 kernel: audit: type=1327 audit(1734105446.454:1210): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.484000 audit[3820]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.489789 kernel: audit: type=1325 audit(1734105446.484:1211): table=filter:108 family=2 entries=10 op=nft_register_rule pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.484000 audit[3820]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff4dfe8610 a2=0 a3=7fff4dfe85fc items=0 ppid=2245 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.503483 kernel: audit: type=1300 audit(1734105446.484:1211): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff4dfe8610 a2=0 a3=7fff4dfe85fc items=0 ppid=2245 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.503580 kernel: audit: type=1327 audit(1734105446.484:1211): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.506000 audit[3820]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.516787 kernel: audit: type=1325 audit(1734105446.506:1212): table=nat:109 family=2 entries=56 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:26.506000 audit[3820]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff4dfe8610 a2=0 a3=7fff4dfe85fc items=0 ppid=2245 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:26.579000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:26.579000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002349110 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:26.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:26.579000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:26.579000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001249fe0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:26.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:26.650471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount766605392.mount: Deactivated successfully. Dec 13 15:57:26.740901 systemd-networkd[1018]: cali83a182e0b5a: Gained IPv6LL Dec 13 15:57:26.741417 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Dec 13 15:57:27.149000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.149000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.149000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009254f60 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:27.149000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00d6dbb40 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:27.150000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.150000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009177980 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.150000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:27.150000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.150000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009254fc0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.150000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:27.154000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.154000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d6dbcc0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.154000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:27.154000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:27.154000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009255200 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:57:27.154000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:57:29.660922 systemd[1]: run-containerd-runc-k8s.io-6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d-runc.P8f3PT.mount: Deactivated successfully. Dec 13 15:57:30.927000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:30.927000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:30.927000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025d4880 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:30.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:30.927000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e8d000 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:30.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:30.929000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:30.929000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025d48a0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:30.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:30.929000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:30.929000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e8d020 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:57:30.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:32.041322 env[1203]: time="2024-12-13T15:57:32.041246938Z" level=info msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" Dec 13 15:57:32.074550 env[1203]: time="2024-12-13T15:57:32.074488008Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:57:32.074979 env[1203]: time="2024-12-13T15:57:32.074827430Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:57:32.076387 env[1203]: time="2024-12-13T15:57:32.076333960Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.146 [WARNING][3865] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94", Pod:"coredns-76f75df574-8hlp5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali83a182e0b5a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.146 [INFO][3865] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.146 [INFO][3865] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" iface="eth0" netns="" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.146 [INFO][3865] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.147 [INFO][3865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.259 [INFO][3920] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.267 [INFO][3920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.268 [INFO][3920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.278 [WARNING][3920] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.278 [INFO][3920] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.286 [INFO][3920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.291026 env[1203]: 2024-12-13 15:57:32.288 [INFO][3865] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.292898 env[1203]: time="2024-12-13T15:57:32.291827513Z" level=info msg="TearDown network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" successfully" Dec 13 15:57:32.293041 env[1203]: time="2024-12-13T15:57:32.293008650Z" level=info msg="StopPodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" returns successfully" Dec 13 15:57:32.295784 env[1203]: time="2024-12-13T15:57:32.295727755Z" level=info msg="RemovePodSandbox for \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" Dec 13 15:57:32.295884 env[1203]: time="2024-12-13T15:57:32.295801148Z" level=info msg="Forcibly stopping sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\"" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.265 [INFO][3921] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.266 [INFO][3921] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" iface="eth0" netns="/var/run/netns/cni-3d996acb-7a32-db76-f30a-5fac623c945b" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.266 [INFO][3921] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" iface="eth0" netns="/var/run/netns/cni-3d996acb-7a32-db76-f30a-5fac623c945b" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.266 [INFO][3921] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" iface="eth0" netns="/var/run/netns/cni-3d996acb-7a32-db76-f30a-5fac623c945b" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.266 [INFO][3921] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.266 [INFO][3921] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.370 [INFO][3942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.371 [INFO][3942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.371 [INFO][3942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.395 [WARNING][3942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.395 [INFO][3942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.398 [INFO][3942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.405187 env[1203]: 2024-12-13 15:57:32.400 [INFO][3921] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:57:32.410429 systemd[1]: run-netns-cni\x2d3d996acb\x2d7a32\x2ddb76\x2df30a\x2d5fac623c945b.mount: Deactivated successfully. Dec 13 15:57:32.412365 env[1203]: time="2024-12-13T15:57:32.412302935Z" level=info msg="TearDown network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" successfully" Dec 13 15:57:32.412493 env[1203]: time="2024-12-13T15:57:32.412460149Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" returns successfully" Dec 13 15:57:32.413709 env[1203]: time="2024-12-13T15:57:32.413671805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f454bbfd7-km4k7,Uid:adadad57-fe17-4044-8f86-e95a257eba7f,Namespace:calico-system,Attempt:1,}" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.313 [INFO][3919] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.313 [INFO][3919] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" iface="eth0" netns="/var/run/netns/cni-34c86e2a-8644-3988-4f65-fc06da5e0b2b" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.313 [INFO][3919] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" iface="eth0" netns="/var/run/netns/cni-34c86e2a-8644-3988-4f65-fc06da5e0b2b" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.314 [INFO][3919] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" iface="eth0" netns="/var/run/netns/cni-34c86e2a-8644-3988-4f65-fc06da5e0b2b" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.314 [INFO][3919] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.314 [INFO][3919] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.375 [INFO][3949] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.375 [INFO][3949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.398 [INFO][3949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.412 [WARNING][3949] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.412 [INFO][3949] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.417 [INFO][3949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.426787 env[1203]: 2024-12-13 15:57:32.423 [INFO][3919] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:57:32.431905 systemd[1]: run-netns-cni\x2d34c86e2a\x2d8644\x2d3988\x2d4f65\x2dfc06da5e0b2b.mount: Deactivated successfully. Dec 13 15:57:32.433211 env[1203]: time="2024-12-13T15:57:32.433170912Z" level=info msg="TearDown network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" successfully" Dec 13 15:57:32.433364 env[1203]: time="2024-12-13T15:57:32.433318264Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" returns successfully" Dec 13 15:57:32.435344 env[1203]: time="2024-12-13T15:57:32.435255511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-hrtkg,Uid:4b4ae775-3ac5-4022-a30e-f124eec91c0d,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.391 [INFO][3929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.391 [INFO][3929] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" iface="eth0" netns="/var/run/netns/cni-b74d7806-c2df-831f-c3fc-68b952e69a45" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.391 [INFO][3929] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" iface="eth0" netns="/var/run/netns/cni-b74d7806-c2df-831f-c3fc-68b952e69a45" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.392 [INFO][3929] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" iface="eth0" netns="/var/run/netns/cni-b74d7806-c2df-831f-c3fc-68b952e69a45" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.392 [INFO][3929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.392 [INFO][3929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.541 [INFO][3973] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.542 [INFO][3973] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.542 [INFO][3973] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.554 [WARNING][3973] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.554 [INFO][3973] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.563 [INFO][3973] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.567224 env[1203]: 2024-12-13 15:57:32.565 [INFO][3929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:57:32.569019 env[1203]: time="2024-12-13T15:57:32.568587149Z" level=info msg="TearDown network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" successfully" Dec 13 15:57:32.569019 env[1203]: time="2024-12-13T15:57:32.568648232Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" returns successfully" Dec 13 15:57:32.570571 env[1203]: time="2024-12-13T15:57:32.570533672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-6z2p6,Uid:91009ef9-d84c-4dac-b013-a8397dac44f7,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.585 [WARNING][3967] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"9ec53c16-56c8-4c9a-9d1e-ebcef20cb6e9", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6dab3245564a6efe4421db49934ece5a3243d28cc3b18a7b1b50a65e24543d94", Pod:"coredns-76f75df574-8hlp5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali83a182e0b5a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.586 [INFO][3967] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.586 [INFO][3967] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" iface="eth0" netns="" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.586 [INFO][3967] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.586 [INFO][3967] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.686 [INFO][4004] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.686 [INFO][4004] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.686 [INFO][4004] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.699 [WARNING][4004] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.699 [INFO][4004] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" HandleID="k8s-pod-network.03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--8hlp5-eth0" Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.702 [INFO][4004] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.707647 env[1203]: 2024-12-13 15:57:32.705 [INFO][3967] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df" Dec 13 15:57:32.708918 env[1203]: time="2024-12-13T15:57:32.707686577Z" level=info msg="TearDown network for sandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" successfully" Dec 13 15:57:32.714754 env[1203]: time="2024-12-13T15:57:32.714697350Z" level=info msg="RemovePodSandbox \"03913369bfdc834e89d531c79e319bee64c1d81744644b4ffa6d4265ae0771df\" returns successfully" Dec 13 15:57:32.715839 env[1203]: time="2024-12-13T15:57:32.715804617Z" level=info msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" Dec 13 15:57:32.815051 systemd-networkd[1018]: cali0e0e29ccb5c: Link UP Dec 13 15:57:32.825727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:57:32.825981 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e0e29ccb5c: link becomes ready Dec 13 15:57:32.826812 systemd-networkd[1018]: cali0e0e29ccb5c: Gained carrier Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.633 [INFO][3982] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0 calico-kube-controllers-7f454bbfd7- calico-system adadad57-fe17-4044-8f86-e95a257eba7f 833 0 2024-12-13 15:56:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7f454bbfd7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com calico-kube-controllers-7f454bbfd7-km4k7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0e0e29ccb5c [] []}} ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.633 [INFO][3982] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.736 [INFO][4022] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" HandleID="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.754 [INFO][4022] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" HandleID="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310960), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"calico-kube-controllers-7f454bbfd7-km4k7", "timestamp":"2024-12-13 15:57:32.736407229 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.754 [INFO][4022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.754 [INFO][4022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.754 [INFO][4022] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.756 [INFO][4022] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.762 [INFO][4022] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.767 [INFO][4022] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.770 [INFO][4022] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.773 [INFO][4022] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.773 [INFO][4022] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.775 [INFO][4022] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3 Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.789 [INFO][4022] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.797 [INFO][4022] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.195/26] block=192.168.93.192/26 handle="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.797 [INFO][4022] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.195/26] handle="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.797 [INFO][4022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:32.870935 env[1203]: 2024-12-13 15:57:32.797 [INFO][4022] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.195/26] IPv6=[] ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" HandleID="k8s-pod-network.396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.799 [INFO][3982] cni-plugin/k8s.go 386: Populated endpoint ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0", GenerateName:"calico-kube-controllers-7f454bbfd7-", Namespace:"calico-system", SelfLink:"", UID:"adadad57-fe17-4044-8f86-e95a257eba7f", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f454bbfd7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-7f454bbfd7-km4k7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0e0e29ccb5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.800 [INFO][3982] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.195/32] ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.800 [INFO][3982] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0e0e29ccb5c ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.830 [INFO][3982] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.832 [INFO][3982] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0", GenerateName:"calico-kube-controllers-7f454bbfd7-", Namespace:"calico-system", SelfLink:"", UID:"adadad57-fe17-4044-8f86-e95a257eba7f", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f454bbfd7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3", Pod:"calico-kube-controllers-7f454bbfd7-km4k7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0e0e29ccb5c", MAC:"b2:06:83:4a:f8:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:32.874010 env[1203]: 2024-12-13 15:57:32.855 [INFO][3982] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3" Namespace="calico-system" Pod="calico-kube-controllers-7f454bbfd7-km4k7" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:57:32.906000 audit[4071]: NETFILTER_CFG table=filter:110 family=2 entries=48 op=nft_register_chain pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:32.910389 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 15:57:32.910503 kernel: audit: type=1325 audit(1734105452.906:1225): table=filter:110 family=2 entries=48 op=nft_register_chain pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:32.906000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=24376 a0=3 a1=7ffd82eec710 a2=0 a3=7ffd82eec6fc items=0 ppid=3330 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:32.921148 kernel: audit: type=1300 audit(1734105452.906:1225): arch=c000003e syscall=46 success=yes exit=24376 a0=3 a1=7ffd82eec710 a2=0 a3=7ffd82eec6fc items=0 ppid=3330 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:32.906000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:32.929827 kernel: audit: type=1327 audit(1734105452.906:1225): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:32.980046 env[1203]: time="2024-12-13T15:57:32.979893679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:32.980464 env[1203]: time="2024-12-13T15:57:32.980414317Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:32.980829 env[1203]: time="2024-12-13T15:57:32.980769026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:32.981827 env[1203]: time="2024-12-13T15:57:32.981223042Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3 pid=4087 runtime=io.containerd.runc.v2 Dec 13 15:57:32.993030 systemd-networkd[1018]: cali82bd1ab1ddf: Link UP Dec 13 15:57:32.999240 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82bd1ab1ddf: link becomes ready Dec 13 15:57:32.998952 systemd-networkd[1018]: cali82bd1ab1ddf: Gained carrier Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.667 [INFO][3988] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0 calico-apiserver-55c688fc- calico-apiserver 4b4ae775-3ac5-4022-a30e-f124eec91c0d 834 0 2024-12-13 15:56:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55c688fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com calico-apiserver-55c688fc-hrtkg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali82bd1ab1ddf [] []}} ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.667 [INFO][3988] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.779 [INFO][4032] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" HandleID="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.812 [INFO][4032] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" HandleID="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027e360), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"calico-apiserver-55c688fc-hrtkg", "timestamp":"2024-12-13 15:57:32.779160233 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.812 [INFO][4032] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.812 [INFO][4032] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.812 [INFO][4032] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.823 [INFO][4032] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.867 [INFO][4032] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.898 [INFO][4032] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.905 [INFO][4032] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.911 [INFO][4032] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.911 [INFO][4032] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.921 [INFO][4032] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421 Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.945 [INFO][4032] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.960 [INFO][4032] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.196/26] block=192.168.93.192/26 handle="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.960 [INFO][4032] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.196/26] handle="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.960 [INFO][4032] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:33.036272 env[1203]: 2024-12-13 15:57:32.960 [INFO][4032] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.196/26] IPv6=[] ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" HandleID="k8s-pod-network.596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:32.964 [INFO][3988] cni-plugin/k8s.go 386: Populated endpoint ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4ae775-3ac5-4022-a30e-f124eec91c0d", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-55c688fc-hrtkg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82bd1ab1ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:32.964 [INFO][3988] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.196/32] ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:32.964 [INFO][3988] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali82bd1ab1ddf ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:33.000 [INFO][3988] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:33.000 [INFO][3988] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4ae775-3ac5-4022-a30e-f124eec91c0d", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421", Pod:"calico-apiserver-55c688fc-hrtkg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82bd1ab1ddf", MAC:"b6:d3:e4:ae:04:69", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.037601 env[1203]: 2024-12-13 15:57:33.019 [INFO][3988] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-hrtkg" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:57:33.059151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1b490cc1100: link becomes ready Dec 13 15:57:33.058579 systemd-networkd[1018]: cali1b490cc1100: Link UP Dec 13 15:57:33.058949 systemd-networkd[1018]: cali1b490cc1100: Gained carrier Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.686 [INFO][4003] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0 calico-apiserver-55c688fc- calico-apiserver 91009ef9-d84c-4dac-b013-a8397dac44f7 835 0 2024-12-13 15:56:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55c688fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com calico-apiserver-55c688fc-6z2p6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1b490cc1100 [] []}} ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.686 [INFO][4003] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.891 [INFO][4037] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" HandleID="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.934 [INFO][4037] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" HandleID="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011a330), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"calico-apiserver-55c688fc-6z2p6", "timestamp":"2024-12-13 15:57:32.891182028 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.935 [INFO][4037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.960 [INFO][4037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.960 [INFO][4037] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.964 [INFO][4037] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.978 [INFO][4037] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.992 [INFO][4037] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:32.996 [INFO][4037] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.001 [INFO][4037] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.001 [INFO][4037] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.009 [INFO][4037] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33 Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.030 [INFO][4037] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.045 [INFO][4037] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.197/26] block=192.168.93.192/26 handle="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.045 [INFO][4037] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.197/26] handle="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.045 [INFO][4037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:33.097024 env[1203]: 2024-12-13 15:57:33.045 [INFO][4037] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.197/26] IPv6=[] ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" HandleID="k8s-pod-network.8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.051 [INFO][4003] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"91009ef9-d84c-4dac-b013-a8397dac44f7", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-55c688fc-6z2p6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1b490cc1100", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.051 [INFO][4003] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.197/32] ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.051 [INFO][4003] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1b490cc1100 ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.060 [INFO][4003] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.060 [INFO][4003] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"91009ef9-d84c-4dac-b013-a8397dac44f7", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33", Pod:"calico-apiserver-55c688fc-6z2p6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1b490cc1100", MAC:"1e:bd:20:55:98:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.100730 env[1203]: 2024-12-13 15:57:33.091 [INFO][4003] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33" Namespace="calico-apiserver" Pod="calico-apiserver-55c688fc-6z2p6" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:57:33.111000 audit[4130]: NETFILTER_CFG table=filter:111 family=2 entries=54 op=nft_register_chain pid=4130 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:33.116883 kernel: audit: type=1325 audit(1734105453.111:1226): table=filter:111 family=2 entries=54 op=nft_register_chain pid=4130 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:33.111000 audit[4130]: SYSCALL arch=c000003e syscall=46 success=yes exit=28704 a0=3 a1=7ffcf98b7710 a2=0 a3=7ffcf98b76fc items=0 ppid=3330 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.126822 kernel: audit: type=1300 audit(1734105453.111:1226): arch=c000003e syscall=46 success=yes exit=28704 a0=3 a1=7ffcf98b7710 a2=0 a3=7ffcf98b76fc items=0 ppid=3330 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.111000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:33.130989 systemd[1]: Started cri-containerd-396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3.scope. Dec 13 15:57:33.138698 kernel: audit: type=1327 audit(1734105453.111:1226): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:32.952 [WARNING][4056] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"98935422-a7cb-4bf5-95dc-671007a56ae6", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab", Pod:"coredns-76f75df574-5tkdn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05c9c4b6615", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:32.952 [INFO][4056] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:32.952 [INFO][4056] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" iface="eth0" netns="" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:32.952 [INFO][4056] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:32.952 [INFO][4056] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.129 [INFO][4088] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.129 [INFO][4088] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.139 [INFO][4088] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.158 [WARNING][4088] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.158 [INFO][4088] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.162 [INFO][4088] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:33.165787 env[1203]: 2024-12-13 15:57:33.163 [INFO][4056] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.166890 env[1203]: time="2024-12-13T15:57:33.166835978Z" level=info msg="TearDown network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" successfully" Dec 13 15:57:33.167027 env[1203]: time="2024-12-13T15:57:33.166993975Z" level=info msg="StopPodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" returns successfully" Dec 13 15:57:33.168767 env[1203]: time="2024-12-13T15:57:33.167910646Z" level=info msg="RemovePodSandbox for \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" Dec 13 15:57:33.168767 env[1203]: time="2024-12-13T15:57:33.167957764Z" level=info msg="Forcibly stopping sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\"" Dec 13 15:57:33.173781 env[1203]: time="2024-12-13T15:57:33.171376027Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:33.173781 env[1203]: time="2024-12-13T15:57:33.171486304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:33.173781 env[1203]: time="2024-12-13T15:57:33.171560440Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:33.173781 env[1203]: time="2024-12-13T15:57:33.172272637Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421 pid=4145 runtime=io.containerd.runc.v2 Dec 13 15:57:33.186726 env[1203]: time="2024-12-13T15:57:33.186624916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:33.186954 env[1203]: time="2024-12-13T15:57:33.186690323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:33.186954 env[1203]: time="2024-12-13T15:57:33.186708242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:33.187226 env[1203]: time="2024-12-13T15:57:33.187177127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33 pid=4172 runtime=io.containerd.runc.v2 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.252995 kernel: audit: type=1400 audit(1734105453.243:1227): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.261818 kernel: audit: type=1400 audit(1734105453.243:1228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.263134 systemd[1]: Started cri-containerd-596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421.scope. Dec 13 15:57:33.268206 systemd[1]: Started cri-containerd-8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33.scope. Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.276797 kernel: audit: type=1400 audit(1734105453.243:1229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.287258 kernel: audit: type=1400 audit(1734105453.243:1230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.243000 audit: BPF prog-id=177 op=LOAD Dec 13 15:57:33.247000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.247000 audit[4105]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4087 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366231323933363831396534323236343038316365623163656533 Dec 13 15:57:33.247000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.247000 audit[4105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4087 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366231323933363831396534323236343038316365623163656533 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit: BPF prog-id=178 op=LOAD Dec 13 15:57:33.251000 audit[4105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e4b90 items=0 ppid=4087 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366231323933363831396534323236343038316365623163656533 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit: BPF prog-id=179 op=LOAD Dec 13 15:57:33.251000 audit[4105]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e4bd8 items=0 ppid=4087 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366231323933363831396534323236343038316365623163656533 Dec 13 15:57:33.251000 audit: BPF prog-id=179 op=UNLOAD Dec 13 15:57:33.251000 audit: BPF prog-id=178 op=UNLOAD Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.251000 audit: BPF prog-id=180 op=LOAD Dec 13 15:57:33.251000 audit[4105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4fe8 items=0 ppid=4087 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366231323933363831396534323236343038316365623163656533 Dec 13 15:57:33.262000 audit[4216]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=4216 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:33.262000 audit[4216]: SYSCALL arch=c000003e syscall=46 success=yes exit=21484 a0=3 a1=7ffe03a7a530 a2=0 a3=7ffe03a7a51c items=0 ppid=3330 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.262000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.393000 audit: BPF prog-id=181 op=LOAD Dec 13 15:57:33.402000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.402000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866363239656530336232633262633936323966313561346635333063 Dec 13 15:57:33.402000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.402000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866363239656530336232633262633936323966313561346635333063 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit: BPF prog-id=182 op=LOAD Dec 13 15:57:33.403000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000308900 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866363239656530336232633262633936323966313561346635333063 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.403000 audit: BPF prog-id=183 op=LOAD Dec 13 15:57:33.403000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000308948 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866363239656530336232633262633936323966313561346635333063 Dec 13 15:57:33.403000 audit: BPF prog-id=183 op=UNLOAD Dec 13 15:57:33.404000 audit: BPF prog-id=182 op=UNLOAD Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.404000 audit: BPF prog-id=184 op=LOAD Dec 13 15:57:33.404000 audit[4185]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000308d58 items=0 ppid=4172 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866363239656530336232633262633936323966313561346635333063 Dec 13 15:57:33.417141 systemd[1]: run-netns-cni\x2db74d7806\x2dc2df\x2d831f\x2dc3fc\x2d68b952e69a45.mount: Deactivated successfully. Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.475000 audit: BPF prog-id=185 op=LOAD Dec 13 15:57:33.476000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.476000 audit[4178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4145 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366333626362393662373934376333353264343932353238653265 Dec 13 15:57:33.476000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.476000 audit[4178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4145 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366333626362393662373934376333353264343932353238653265 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.477000 audit: BPF prog-id=186 op=LOAD Dec 13 15:57:33.477000 audit[4178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003de390 items=0 ppid=4145 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366333626362393662373934376333353264343932353238653265 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.480000 audit: BPF prog-id=187 op=LOAD Dec 13 15:57:33.480000 audit[4178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003de3d8 items=0 ppid=4145 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366333626362393662373934376333353264343932353238653265 Dec 13 15:57:33.480000 audit: BPF prog-id=187 op=UNLOAD Dec 13 15:57:33.482000 audit: BPF prog-id=186 op=UNLOAD Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { perfmon } for pid=4178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit[4178]: AVC avc: denied { bpf } for pid=4178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:33.482000 audit: BPF prog-id=188 op=LOAD Dec 13 15:57:33.482000 audit[4178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de7e8 items=0 ppid=4145 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:33.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366333626362393662373934376333353264343932353238653265 Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.373 [WARNING][4198] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"98935422-a7cb-4bf5-95dc-671007a56ae6", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"1d63a239305ad3182299c8bdaf85c950d6702279ffb9e62c361524ef7e2214ab", Pod:"coredns-76f75df574-5tkdn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05c9c4b6615", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.374 [INFO][4198] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.374 [INFO][4198] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" iface="eth0" netns="" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.374 [INFO][4198] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.374 [INFO][4198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.492 [INFO][4222] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.493 [INFO][4222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.493 [INFO][4222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.506 [WARNING][4222] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.507 [INFO][4222] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" HandleID="k8s-pod-network.4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Workload="srv--8d9xb.gb1.brightbox.com-k8s-coredns--76f75df574--5tkdn-eth0" Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.510 [INFO][4222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:33.517954 env[1203]: 2024-12-13 15:57:33.514 [INFO][4198] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc" Dec 13 15:57:33.519487 env[1203]: time="2024-12-13T15:57:33.519443134Z" level=info msg="TearDown network for sandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" successfully" Dec 13 15:57:33.526251 env[1203]: time="2024-12-13T15:57:33.526201009Z" level=info msg="RemovePodSandbox \"4200da467f06a1d6e94626699bebdb4b5a106d07f2cd164a9e07094384cc5acc\" returns successfully" Dec 13 15:57:33.541788 env[1203]: time="2024-12-13T15:57:33.541717161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f454bbfd7-km4k7,Uid:adadad57-fe17-4044-8f86-e95a257eba7f,Namespace:calico-system,Attempt:1,} returns sandbox id \"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3\"" Dec 13 15:57:33.547658 env[1203]: time="2024-12-13T15:57:33.547256127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 15:57:33.582555 env[1203]: time="2024-12-13T15:57:33.582495366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-6z2p6,Uid:91009ef9-d84c-4dac-b013-a8397dac44f7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33\"" Dec 13 15:57:33.620131 env[1203]: time="2024-12-13T15:57:33.620070511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55c688fc-hrtkg,Uid:4b4ae775-3ac5-4022-a30e-f124eec91c0d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421\"" Dec 13 15:57:34.030066 systemd-networkd[1018]: cali82bd1ab1ddf: Gained IPv6LL Dec 13 15:57:34.222008 systemd-networkd[1018]: cali0e0e29ccb5c: Gained IPv6LL Dec 13 15:57:34.669976 systemd-networkd[1018]: cali1b490cc1100: Gained IPv6LL Dec 13 15:57:36.073525 env[1203]: time="2024-12-13T15:57:36.073412372Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.291 [INFO][4280] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.292 [INFO][4280] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" iface="eth0" netns="/var/run/netns/cni-73c858e0-bf8b-02d8-3968-5906d24b89e9" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.293 [INFO][4280] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" iface="eth0" netns="/var/run/netns/cni-73c858e0-bf8b-02d8-3968-5906d24b89e9" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.293 [INFO][4280] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" iface="eth0" netns="/var/run/netns/cni-73c858e0-bf8b-02d8-3968-5906d24b89e9" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.293 [INFO][4280] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.293 [INFO][4280] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.352 [INFO][4286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.352 [INFO][4286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.352 [INFO][4286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.361 [WARNING][4286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.361 [INFO][4286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.363 [INFO][4286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:36.368262 env[1203]: 2024-12-13 15:57:36.366 [INFO][4280] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:57:36.374246 systemd[1]: run-netns-cni\x2d73c858e0\x2dbf8b\x2d02d8\x2d3968\x2d5906d24b89e9.mount: Deactivated successfully. Dec 13 15:57:36.379571 env[1203]: time="2024-12-13T15:57:36.378582740Z" level=info msg="TearDown network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" successfully" Dec 13 15:57:36.379755 env[1203]: time="2024-12-13T15:57:36.379701175Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" returns successfully" Dec 13 15:57:36.382198 env[1203]: time="2024-12-13T15:57:36.382127908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cqqzv,Uid:009bebc9-013c-4d7e-9ae4-7bb3c5895dc1,Namespace:calico-system,Attempt:1,}" Dec 13 15:57:36.663353 systemd-networkd[1018]: cali21ff49e9f25: Link UP Dec 13 15:57:36.670953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:57:36.671405 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali21ff49e9f25: link becomes ready Dec 13 15:57:36.675135 systemd-networkd[1018]: cali21ff49e9f25: Gained carrier Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.500 [INFO][4292] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0 csi-node-driver- calico-system 009bebc9-013c-4d7e-9ae4-7bb3c5895dc1 861 0 2024-12-13 15:56:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-8d9xb.gb1.brightbox.com csi-node-driver-cqqzv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali21ff49e9f25 [] []}} ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.500 [INFO][4292] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.586 [INFO][4303] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" HandleID="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.606 [INFO][4303] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" HandleID="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311370), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-8d9xb.gb1.brightbox.com", "pod":"csi-node-driver-cqqzv", "timestamp":"2024-12-13 15:57:36.586462585 +0000 UTC"}, Hostname:"srv-8d9xb.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.606 [INFO][4303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.606 [INFO][4303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.606 [INFO][4303] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-8d9xb.gb1.brightbox.com' Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.609 [INFO][4303] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.614 [INFO][4303] ipam/ipam.go 372: Looking up existing affinities for host host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.622 [INFO][4303] ipam/ipam.go 489: Trying affinity for 192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.625 [INFO][4303] ipam/ipam.go 155: Attempting to load block cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.628 [INFO][4303] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.93.192/26 host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.628 [INFO][4303] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.93.192/26 handle="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.630 [INFO][4303] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7 Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.637 [INFO][4303] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.93.192/26 handle="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.644 [INFO][4303] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.93.198/26] block=192.168.93.192/26 handle="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.646 [INFO][4303] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.93.198/26] handle="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" host="srv-8d9xb.gb1.brightbox.com" Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.646 [INFO][4303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:57:36.711327 env[1203]: 2024-12-13 15:57:36.646 [INFO][4303] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.198/26] IPv6=[] ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" HandleID="k8s-pod-network.6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.649 [INFO][4292] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-cqqzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali21ff49e9f25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.650 [INFO][4292] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.93.198/32] ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.650 [INFO][4292] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali21ff49e9f25 ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.678 [INFO][4292] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.679 [INFO][4292] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7", Pod:"csi-node-driver-cqqzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali21ff49e9f25", MAC:"da:a2:9c:39:e1:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:57:36.712821 env[1203]: 2024-12-13 15:57:36.709 [INFO][4292] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7" Namespace="calico-system" Pod="csi-node-driver-cqqzv" WorkloadEndpoint="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:57:36.791994 env[1203]: time="2024-12-13T15:57:36.791033799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:57:36.791994 env[1203]: time="2024-12-13T15:57:36.791119119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:57:36.791994 env[1203]: time="2024-12-13T15:57:36.791138269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:57:36.791994 env[1203]: time="2024-12-13T15:57:36.791366582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7 pid=4328 runtime=io.containerd.runc.v2 Dec 13 15:57:36.838775 systemd[1]: Started cri-containerd-6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7.scope. Dec 13 15:57:36.903000 audit[4351]: NETFILTER_CFG table=filter:113 family=2 entries=42 op=nft_register_chain pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:57:36.903000 audit[4351]: SYSCALL arch=c000003e syscall=46 success=yes exit=20984 a0=3 a1=7ffe83246970 a2=0 a3=7ffe8324695c items=0 ppid=3330 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.903000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.964000 audit: BPF prog-id=189 op=LOAD Dec 13 15:57:36.966000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.966000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4328 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353332363432623264306264656266623861643266373837313962 Dec 13 15:57:36.966000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.966000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4328 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353332363432623264306264656266623861643266373837313962 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.967000 audit: BPF prog-id=190 op=LOAD Dec 13 15:57:36.967000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002191e0 items=0 ppid=4328 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353332363432623264306264656266623861643266373837313962 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.968000 audit: BPF prog-id=191 op=LOAD Dec 13 15:57:36.968000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219228 items=0 ppid=4328 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353332363432623264306264656266623861643266373837313962 Dec 13 15:57:36.969000 audit: BPF prog-id=191 op=UNLOAD Dec 13 15:57:36.969000 audit: BPF prog-id=190 op=UNLOAD Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:36.969000 audit: BPF prog-id=192 op=LOAD Dec 13 15:57:36.969000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219638 items=0 ppid=4328 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:36.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353332363432623264306264656266623861643266373837313962 Dec 13 15:57:37.008554 env[1203]: time="2024-12-13T15:57:37.008472337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cqqzv,Uid:009bebc9-013c-4d7e-9ae4-7bb3c5895dc1,Namespace:calico-system,Attempt:1,} returns sandbox id \"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7\"" Dec 13 15:57:37.373692 systemd[1]: run-containerd-runc-k8s.io-6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7-runc.8L812s.mount: Deactivated successfully. Dec 13 15:57:37.511616 env[1203]: time="2024-12-13T15:57:37.511532951Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:37.516047 env[1203]: time="2024-12-13T15:57:37.516008388Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:37.521699 env[1203]: time="2024-12-13T15:57:37.521651891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:37.528276 env[1203]: time="2024-12-13T15:57:37.528222582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:37.529274 env[1203]: time="2024-12-13T15:57:37.529208766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 15:57:37.530682 env[1203]: time="2024-12-13T15:57:37.530638431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:57:37.603951 env[1203]: time="2024-12-13T15:57:37.603887059Z" level=info msg="CreateContainer within sandbox \"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 15:57:37.667264 env[1203]: time="2024-12-13T15:57:37.667144856Z" level=info msg="CreateContainer within sandbox \"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c\"" Dec 13 15:57:37.668559 env[1203]: time="2024-12-13T15:57:37.668510319Z" level=info msg="StartContainer for \"471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c\"" Dec 13 15:57:37.698710 systemd[1]: Started cri-containerd-471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c.scope. Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.739000 audit: BPF prog-id=193 op=LOAD Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4087 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437316563336630383130376237306265623765643133666363333439 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4087 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437316563336630383130376237306265623765643133666363333439 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit: BPF prog-id=194 op=LOAD Dec 13 15:57:37.740000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025190 items=0 ppid=4087 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437316563336630383130376237306265623765643133666363333439 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit: BPF prog-id=195 op=LOAD Dec 13 15:57:37.740000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251d8 items=0 ppid=4087 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437316563336630383130376237306265623765643133666363333439 Dec 13 15:57:37.740000 audit: BPF prog-id=195 op=UNLOAD Dec 13 15:57:37.740000 audit: BPF prog-id=194 op=UNLOAD Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:37.740000 audit: BPF prog-id=196 op=LOAD Dec 13 15:57:37.740000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255e8 items=0 ppid=4087 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437316563336630383130376237306265623765643133666363333439 Dec 13 15:57:37.789951 env[1203]: time="2024-12-13T15:57:37.789890593Z" level=info msg="StartContainer for \"471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c\" returns successfully" Dec 13 15:57:38.130855 systemd-networkd[1018]: cali21ff49e9f25: Gained IPv6LL Dec 13 15:57:38.450793 kubelet[2064]: I1213 15:57:38.448716 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7f454bbfd7-km4k7" podStartSLOduration=42.462347842 podStartE2EDuration="46.448581995s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:57:33.543646957 +0000 UTC m=+61.724917509" lastFinishedPulling="2024-12-13 15:57:37.529881099 +0000 UTC m=+65.711151662" observedRunningTime="2024-12-13 15:57:38.448087126 +0000 UTC m=+66.629357710" watchObservedRunningTime="2024-12-13 15:57:38.448581995 +0000 UTC m=+66.629852557" Dec 13 15:57:38.736656 systemd[1]: run-containerd-runc-k8s.io-471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c-runc.E70fHm.mount: Deactivated successfully. Dec 13 15:57:41.722589 env[1203]: time="2024-12-13T15:57:41.722483543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:41.725537 env[1203]: time="2024-12-13T15:57:41.725489540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:41.729062 env[1203]: time="2024-12-13T15:57:41.729023039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:41.732194 env[1203]: time="2024-12-13T15:57:41.732142536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:41.733251 env[1203]: time="2024-12-13T15:57:41.733201132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:57:41.736894 env[1203]: time="2024-12-13T15:57:41.735057318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:57:41.737961 env[1203]: time="2024-12-13T15:57:41.737862019Z" level=info msg="CreateContainer within sandbox \"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:57:41.758108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2750450968.mount: Deactivated successfully. Dec 13 15:57:41.758835 env[1203]: time="2024-12-13T15:57:41.758777751Z" level=info msg="CreateContainer within sandbox \"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8f748f16be7bc2f0ea7daa2ae218df905c471350acaa336a9f1241b37752f317\"" Dec 13 15:57:41.761385 env[1203]: time="2024-12-13T15:57:41.760367034Z" level=info msg="StartContainer for \"8f748f16be7bc2f0ea7daa2ae218df905c471350acaa336a9f1241b37752f317\"" Dec 13 15:57:41.803535 systemd[1]: Started cri-containerd-8f748f16be7bc2f0ea7daa2ae218df905c471350acaa336a9f1241b37752f317.scope. Dec 13 15:57:41.821871 systemd[1]: run-containerd-runc-k8s.io-8f748f16be7bc2f0ea7daa2ae218df905c471350acaa336a9f1241b37752f317-runc.j9h9XL.mount: Deactivated successfully. Dec 13 15:57:41.883572 kernel: kauditd_printk_skb: 287 callbacks suppressed Dec 13 15:57:41.883834 kernel: audit: type=1400 audit(1734105461.872:1319): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.890765 kernel: audit: type=1400 audit(1734105461.872:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.897766 kernel: audit: type=1400 audit(1734105461.882:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.903868 kernel: audit: type=1400 audit(1734105461.882:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.909763 kernel: audit: type=1400 audit(1734105461.882:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.920596 kernel: audit: type=1400 audit(1734105461.882:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.920677 kernel: audit: type=1400 audit(1734105461.882:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.926811 kernel: audit: type=1400 audit(1734105461.882:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.932765 kernel: audit: type=1400 audit(1734105461.882:1327): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.939854 kernel: audit: type=1400 audit(1734105461.882:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.882000 audit: BPF prog-id=197 op=LOAD Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4172 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:41.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373438663136626537626332663065613764616132616532313864 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4172 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:41.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373438663136626537626332663065613764616132616532313864 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.884000 audit: BPF prog-id=198 op=LOAD Dec 13 15:57:41.884000 audit[4452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000211380 items=0 ppid=4172 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:41.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373438663136626537626332663065613764616132616532313864 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit: BPF prog-id=199 op=LOAD Dec 13 15:57:41.888000 audit[4452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002113c8 items=0 ppid=4172 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:41.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373438663136626537626332663065613764616132616532313864 Dec 13 15:57:41.888000 audit: BPF prog-id=199 op=UNLOAD Dec 13 15:57:41.888000 audit: BPF prog-id=198 op=UNLOAD Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { perfmon } for pid=4452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit[4452]: AVC avc: denied { bpf } for pid=4452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:41.888000 audit: BPF prog-id=200 op=LOAD Dec 13 15:57:41.888000 audit[4452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002117d8 items=0 ppid=4172 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:41.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373438663136626537626332663065613764616132616532313864 Dec 13 15:57:41.987677 env[1203]: time="2024-12-13T15:57:41.987533348Z" level=info msg="StartContainer for \"8f748f16be7bc2f0ea7daa2ae218df905c471350acaa336a9f1241b37752f317\" returns successfully" Dec 13 15:57:42.123994 env[1203]: time="2024-12-13T15:57:42.123936182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:42.125774 env[1203]: time="2024-12-13T15:57:42.125715694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:42.127450 env[1203]: time="2024-12-13T15:57:42.127398406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:42.129513 env[1203]: time="2024-12-13T15:57:42.129473950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:42.130476 env[1203]: time="2024-12-13T15:57:42.130435572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:57:42.133391 env[1203]: time="2024-12-13T15:57:42.132127785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:57:42.135788 env[1203]: time="2024-12-13T15:57:42.135456598Z" level=info msg="CreateContainer within sandbox \"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:57:42.152644 env[1203]: time="2024-12-13T15:57:42.152578236Z" level=info msg="CreateContainer within sandbox \"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7ce9d3d1cccfd9e2bc3ada36215638fd58d298301cbe5b141874ee12df381d33\"" Dec 13 15:57:42.153493 env[1203]: time="2024-12-13T15:57:42.153450816Z" level=info msg="StartContainer for \"7ce9d3d1cccfd9e2bc3ada36215638fd58d298301cbe5b141874ee12df381d33\"" Dec 13 15:57:42.187437 systemd[1]: Started cri-containerd-7ce9d3d1cccfd9e2bc3ada36215638fd58d298301cbe5b141874ee12df381d33.scope. Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.234000 audit: BPF prog-id=201 op=LOAD Dec 13 15:57:42.236000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.236000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4145 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653964336431636363666439653262633361646133363231353633 Dec 13 15:57:42.237000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.237000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4145 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653964336431636363666439653262633361646133363231353633 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.238000 audit: BPF prog-id=202 op=LOAD Dec 13 15:57:42.238000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a0130 items=0 ppid=4145 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653964336431636363666439653262633361646133363231353633 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.240000 audit: BPF prog-id=203 op=LOAD Dec 13 15:57:42.240000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a0178 items=0 ppid=4145 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653964336431636363666439653262633361646133363231353633 Dec 13 15:57:42.241000 audit: BPF prog-id=203 op=UNLOAD Dec 13 15:57:42.241000 audit: BPF prog-id=202 op=UNLOAD Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:42.242000 audit: BPF prog-id=204 op=LOAD Dec 13 15:57:42.242000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a0588 items=0 ppid=4145 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653964336431636363666439653262633361646133363231353633 Dec 13 15:57:42.316174 env[1203]: time="2024-12-13T15:57:42.316104701Z" level=info msg="StartContainer for \"7ce9d3d1cccfd9e2bc3ada36215638fd58d298301cbe5b141874ee12df381d33\" returns successfully" Dec 13 15:57:42.480638 kubelet[2064]: I1213 15:57:42.480555 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-55c688fc-6z2p6" podStartSLOduration=42.330178748 podStartE2EDuration="50.480386256s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:57:33.584649807 +0000 UTC m=+61.765920363" lastFinishedPulling="2024-12-13 15:57:41.734857295 +0000 UTC m=+69.916127871" observedRunningTime="2024-12-13 15:57:42.460791523 +0000 UTC m=+70.642062091" watchObservedRunningTime="2024-12-13 15:57:42.480386256 +0000 UTC m=+70.661656825" Dec 13 15:57:42.576000 audit[4522]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:42.576000 audit[4522]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc4f5f4af0 a2=0 a3=7ffc4f5f4adc items=0 ppid=2245 pid=4522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:42.602000 audit[4522]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:42.602000 audit[4522]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4f5f4af0 a2=0 a3=7ffc4f5f4adc items=0 ppid=2245 pid=4522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:42.661000 audit[4524]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:42.661000 audit[4524]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec8aaf500 a2=0 a3=7ffec8aaf4ec items=0 ppid=2245 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:42.684000 audit[4524]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:42.684000 audit[4524]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffec8aaf500 a2=0 a3=7ffec8aaf4ec items=0 ppid=2245 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:42.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:43.379000 audit[4462]: AVC avc: denied { watch } for pid=4462 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.3790116906/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c563,c672 tclass=file permissive=0 Dec 13 15:57:43.379000 audit[4462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010b9340 a2=fc6 a3=0 items=0 ppid=4172 pid=4462 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 key=(null) Dec 13 15:57:43.379000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:43.450121 kubelet[2064]: I1213 15:57:43.450073 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-55c688fc-hrtkg" podStartSLOduration=42.94203696 podStartE2EDuration="51.450027709s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:57:33.622971795 +0000 UTC m=+61.804242347" lastFinishedPulling="2024-12-13 15:57:42.130962529 +0000 UTC m=+70.312233096" observedRunningTime="2024-12-13 15:57:42.482568371 +0000 UTC m=+70.663838952" watchObservedRunningTime="2024-12-13 15:57:43.450027709 +0000 UTC m=+71.631298265" Dec 13 15:57:43.454727 kubelet[2064]: I1213 15:57:43.454674 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:57:43.735000 audit[4526]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:43.735000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc9c020c00 a2=0 a3=7ffc9c020bec items=0 ppid=2245 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:43.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:43.742000 audit[4526]: NETFILTER_CFG table=nat:119 family=2 entries=27 op=nft_register_chain pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:57:43.742000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc9c020c00 a2=0 a3=7ffc9c020bec items=0 ppid=2245 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:43.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:57:44.381478 env[1203]: time="2024-12-13T15:57:44.381398386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:44.385036 env[1203]: time="2024-12-13T15:57:44.384997667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:44.386034 env[1203]: time="2024-12-13T15:57:44.385998979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:44.391990 env[1203]: time="2024-12-13T15:57:44.391938343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:44.392868 env[1203]: time="2024-12-13T15:57:44.392825760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:57:44.447294 env[1203]: time="2024-12-13T15:57:44.447232969Z" level=info msg="CreateContainer within sandbox \"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:57:44.478011 env[1203]: time="2024-12-13T15:57:44.477941737Z" level=info msg="CreateContainer within sandbox \"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0c4c3aaede810ce577d6eb166181154b21ba05ccdb20a703b74b6ad8bd75020a\"" Dec 13 15:57:44.515052 env[1203]: time="2024-12-13T15:57:44.514995649Z" level=info msg="StartContainer for \"0c4c3aaede810ce577d6eb166181154b21ba05ccdb20a703b74b6ad8bd75020a\"" Dec 13 15:57:44.594274 systemd[1]: run-containerd-runc-k8s.io-0c4c3aaede810ce577d6eb166181154b21ba05ccdb20a703b74b6ad8bd75020a-runc.IcTLVk.mount: Deactivated successfully. Dec 13 15:57:44.604688 systemd[1]: Started cri-containerd-0c4c3aaede810ce577d6eb166181154b21ba05ccdb20a703b74b6ad8bd75020a.scope. Dec 13 15:57:44.675000 audit[4503]: AVC avc: denied { watch } for pid=4503 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.4141313187/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c32,c498 tclass=file permissive=0 Dec 13 15:57:44.675000 audit[4503]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00048fe20 a2=fc6 a3=0 items=0 ppid=4145 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 key=(null) Dec 13 15:57:44.675000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001cd6b0 a2=3c a3=7f9a57b17208 items=0 ppid=4328 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346333616165646538313063653537376436656231363631383131 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit: BPF prog-id=205 op=LOAD Dec 13 15:57:44.698000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001cd9d8 a2=78 a3=c000336368 items=0 ppid=4328 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346333616165646538313063653537376436656231363631383131 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit: BPF prog-id=206 op=LOAD Dec 13 15:57:44.698000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001cd770 a2=78 a3=c0003363b8 items=0 ppid=4328 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346333616165646538313063653537376436656231363631383131 Dec 13 15:57:44.698000 audit: BPF prog-id=206 op=UNLOAD Dec 13 15:57:44.698000 audit: BPF prog-id=205 op=UNLOAD Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:44.698000 audit: BPF prog-id=207 op=LOAD Dec 13 15:57:44.698000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001cdc30 a2=78 a3=c000336448 items=0 ppid=4328 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063346333616165646538313063653537376436656231363631383131 Dec 13 15:57:44.732029 env[1203]: time="2024-12-13T15:57:44.731850520Z" level=info msg="StartContainer for \"0c4c3aaede810ce577d6eb166181154b21ba05ccdb20a703b74b6ad8bd75020a\" returns successfully" Dec 13 15:57:44.741236 env[1203]: time="2024-12-13T15:57:44.741188537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:57:47.261701 env[1203]: time="2024-12-13T15:57:47.261614980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:47.269850 env[1203]: time="2024-12-13T15:57:47.269806879Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:47.271517 env[1203]: time="2024-12-13T15:57:47.271478228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:47.273557 env[1203]: time="2024-12-13T15:57:47.273484182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:57:47.274375 env[1203]: time="2024-12-13T15:57:47.274335150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:57:47.286282 env[1203]: time="2024-12-13T15:57:47.286237084Z" level=info msg="CreateContainer within sandbox \"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:57:47.311625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2264737269.mount: Deactivated successfully. Dec 13 15:57:47.312522 env[1203]: time="2024-12-13T15:57:47.312333764Z" level=info msg="CreateContainer within sandbox \"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"230318fd7a6cda7f013c1e45334da6bb64dffa6f2d2a286833f62e86e55c741d\"" Dec 13 15:57:47.317471 env[1203]: time="2024-12-13T15:57:47.317433955Z" level=info msg="StartContainer for \"230318fd7a6cda7f013c1e45334da6bb64dffa6f2d2a286833f62e86e55c741d\"" Dec 13 15:57:47.359763 systemd[1]: Started cri-containerd-230318fd7a6cda7f013c1e45334da6bb64dffa6f2d2a286833f62e86e55c741d.scope. Dec 13 15:57:47.436549 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 15:57:47.436776 kernel: audit: type=1400 audit(1734105467.425:1369): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.466613 kernel: audit: type=1300 audit(1734105467.425:1369): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f319dc34cf8 items=0 ppid=4328 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:47.472441 kernel: audit: type=1327 audit(1734105467.425:1369): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303331386664376136636461376630313363316534353333346461 Dec 13 15:57:47.472521 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f319dc34cf8 items=0 ppid=4328 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:47.472989 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303331386664376136636461376630313363316534353333346461 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.489640 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.489953 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.499755 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.512906 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.519779 kernel: audit: type=1400 audit(1734105467.425:1370): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit: BPF prog-id=208 op=LOAD Dec 13 15:57:47.425000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009cab8 items=0 ppid=4328 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:47.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303331386664376136636461376630313363316534353333346461 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit: BPF prog-id=209 op=LOAD Dec 13 15:57:47.425000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009cb08 items=0 ppid=4328 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:47.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303331386664376136636461376630313363316534353333346461 Dec 13 15:57:47.425000 audit: BPF prog-id=209 op=UNLOAD Dec 13 15:57:47.425000 audit: BPF prog-id=208 op=UNLOAD Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:57:47.425000 audit: BPF prog-id=210 op=LOAD Dec 13 15:57:47.425000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009cb98 items=0 ppid=4328 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:47.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303331386664376136636461376630313363316534353333346461 Dec 13 15:57:47.529060 env[1203]: time="2024-12-13T15:57:47.529005501Z" level=info msg="StartContainer for \"230318fd7a6cda7f013c1e45334da6bb64dffa6f2d2a286833f62e86e55c741d\" returns successfully" Dec 13 15:57:48.256350 kubelet[2064]: I1213 15:57:48.256285 2064 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:57:48.259569 kubelet[2064]: I1213 15:57:48.259544 2064 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:57:48.304498 systemd[1]: run-containerd-runc-k8s.io-230318fd7a6cda7f013c1e45334da6bb64dffa6f2d2a286833f62e86e55c741d-runc.BV39vl.mount: Deactivated successfully. Dec 13 15:57:48.565002 kubelet[2064]: I1213 15:57:48.564836 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-cqqzv" podStartSLOduration=46.294945139 podStartE2EDuration="56.559209129s" podCreationTimestamp="2024-12-13 15:56:52 +0000 UTC" firstStartedPulling="2024-12-13 15:57:37.010583987 +0000 UTC m=+65.191854543" lastFinishedPulling="2024-12-13 15:57:47.274847971 +0000 UTC m=+75.456118533" observedRunningTime="2024-12-13 15:57:48.558146143 +0000 UTC m=+76.739416726" watchObservedRunningTime="2024-12-13 15:57:48.559209129 +0000 UTC m=+76.740479695" Dec 13 15:57:59.678172 systemd[1]: run-containerd-runc-k8s.io-6fc6e140fc95b3549266cb1d8660ab162edda83e001be5bbbaf2000a0f36189d-runc.736Vk0.mount: Deactivated successfully. Dec 13 15:58:07.290444 kubelet[2064]: I1213 15:58:07.290379 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:58:07.392000 audit[4644]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.397398 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 15:58:07.397580 kernel: audit: type=1325 audit(1734105487.392:1375): table=filter:120 family=2 entries=8 op=nft_register_rule pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.392000 audit[4644]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaa9408b0 a2=0 a3=7ffeaa94089c items=0 ppid=2245 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.409396 kernel: audit: type=1300 audit(1734105487.392:1375): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaa9408b0 a2=0 a3=7ffeaa94089c items=0 ppid=2245 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:07.413315 kernel: audit: type=1327 audit(1734105487.392:1375): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:07.413439 kernel: audit: type=1325 audit(1734105487.411:1376): table=nat:121 family=2 entries=34 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.411000 audit[4644]: NETFILTER_CFG table=nat:121 family=2 entries=34 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.411000 audit[4644]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeaa9408b0 a2=0 a3=7ffeaa94089c items=0 ppid=2245 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:07.431451 kernel: audit: type=1300 audit(1734105487.411:1376): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeaa9408b0 a2=0 a3=7ffeaa94089c items=0 ppid=2245 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.431591 kernel: audit: type=1327 audit(1734105487.411:1376): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:08.738094 systemd[1]: run-containerd-runc-k8s.io-471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c-runc.cMZRpP.mount: Deactivated successfully. Dec 13 15:58:26.583000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:26.583000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f18a40 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:26.604981 kernel: audit: type=1400 audit(1734105506.583:1377): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:26.605098 kernel: audit: type=1300 audit(1734105506.583:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f18a40 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:26.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:26.612277 kernel: audit: type=1327 audit(1734105506.583:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:26.589000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:26.619045 kernel: audit: type=1400 audit(1734105506.589:1378): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:26.589000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c45b00 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:26.627506 kernel: audit: type=1300 audit(1734105506.589:1378): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c45b00 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:26.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:26.635781 kernel: audit: type=1327 audit(1734105506.589:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:27.152000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.165103 kernel: audit: type=1400 audit(1734105507.152:1379): avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.167094 kernel: audit: type=1300 audit(1734105507.152:1379): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009b4b020 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.152000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009b4b020 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.181095 kernel: audit: type=1327 audit(1734105507.152:1379): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.157000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.187800 kernel: audit: type=1400 audit(1734105507.157:1380): avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.157000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009a197a0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.157000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.158000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.158000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009255050 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.158000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.160000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.160000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009a19820 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.160000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.170000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.170000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0092551d0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:27.171000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:27.171000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009b4b110 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:58:27.171000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:58:30.928000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:30.928000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f94f60 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:30.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:30.928000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:30.928000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f18c80 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:30.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:30.930000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:30.930000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f18ca0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:30.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:30.933000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:30.933000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f95240 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:58:30.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:33.004322 systemd[1]: Started sshd@7-10.230.29.154:22-139.178.68.195:43630.service. Dec 13 15:58:33.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.29.154:22-139.178.68.195:43630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:33.017779 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 15:58:33.018544 kernel: audit: type=1130 audit(1734105513.006:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.29.154:22-139.178.68.195:43630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:33.538028 env[1203]: time="2024-12-13T15:58:33.537928498Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:58:33.994000 audit[4696]: USER_ACCT pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.001814 sshd[4696]: Accepted publickey for core from 139.178.68.195 port 43630 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:34.006924 kernel: audit: type=1101 audit(1734105513.994:1390): pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.005000 audit[4696]: CRED_ACQ pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.010417 sshd[4696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:34.015764 kernel: audit: type=1103 audit(1734105514.005:1391): pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.022036 kernel: audit: type=1006 audit(1734105514.005:1392): pid=4696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 15:58:34.023444 kernel: audit: type=1300 audit(1734105514.005:1392): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7e9d02b0 a2=3 a3=0 items=0 ppid=1 pid=4696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.005000 audit[4696]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7e9d02b0 a2=3 a3=0 items=0 ppid=1 pid=4696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:34.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:34.033964 kernel: audit: type=1327 audit(1734105514.005:1392): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:34.062562 systemd[1]: Started session-8.scope. Dec 13 15:58:34.063152 systemd-logind[1190]: New session 8 of user core. Dec 13 15:58:34.079000 audit[4696]: USER_START pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.087000 audit[4721]: CRED_ACQ pid=4721 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.095697 kernel: audit: type=1105 audit(1734105514.079:1393): pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.096181 kernel: audit: type=1103 audit(1734105514.087:1394): pid=4721 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:33.867 [WARNING][4711] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4ae775-3ac5-4022-a30e-f124eec91c0d", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421", Pod:"calico-apiserver-55c688fc-hrtkg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82bd1ab1ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:33.871 [INFO][4711] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:33.871 [INFO][4711] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" iface="eth0" netns="" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:33.871 [INFO][4711] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:33.872 [INFO][4711] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.156 [INFO][4717] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.157 [INFO][4717] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.158 [INFO][4717] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.172 [WARNING][4717] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.172 [INFO][4717] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.174 [INFO][4717] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.179211 env[1203]: 2024-12-13 15:58:34.176 [INFO][4711] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.181674 env[1203]: time="2024-12-13T15:58:34.179264087Z" level=info msg="TearDown network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" successfully" Dec 13 15:58:34.181674 env[1203]: time="2024-12-13T15:58:34.179310767Z" level=info msg="StopPodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" returns successfully" Dec 13 15:58:34.183451 env[1203]: time="2024-12-13T15:58:34.183413239Z" level=info msg="RemovePodSandbox for \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:58:34.183810 env[1203]: time="2024-12-13T15:58:34.183671320Z" level=info msg="Forcibly stopping sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\"" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.242 [WARNING][4736] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4ae775-3ac5-4022-a30e-f124eec91c0d", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"596c3bcb96b7947c352d492528e2e82a0ee55d1b210a70b35adb9347528a4421", Pod:"calico-apiserver-55c688fc-hrtkg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82bd1ab1ddf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.242 [INFO][4736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.242 [INFO][4736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" iface="eth0" netns="" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.242 [INFO][4736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.242 [INFO][4736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.282 [INFO][4743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.282 [INFO][4743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.282 [INFO][4743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.292 [WARNING][4743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.292 [INFO][4743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" HandleID="k8s-pod-network.c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--hrtkg-eth0" Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.298 [INFO][4743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.304480 env[1203]: 2024-12-13 15:58:34.301 [INFO][4736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3" Dec 13 15:58:34.307948 env[1203]: time="2024-12-13T15:58:34.304430215Z" level=info msg="TearDown network for sandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" successfully" Dec 13 15:58:34.311545 env[1203]: time="2024-12-13T15:58:34.311471990Z" level=info msg="RemovePodSandbox \"c4ba7447d81114c3d098faf9fae9a349fbe2d390387a1e4aa10ddec10fc993d3\" returns successfully" Dec 13 15:58:34.312556 env[1203]: time="2024-12-13T15:58:34.312506866Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.365 [WARNING][4761] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0", GenerateName:"calico-kube-controllers-7f454bbfd7-", Namespace:"calico-system", SelfLink:"", UID:"adadad57-fe17-4044-8f86-e95a257eba7f", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f454bbfd7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3", Pod:"calico-kube-controllers-7f454bbfd7-km4k7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0e0e29ccb5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.365 [INFO][4761] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.365 [INFO][4761] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" iface="eth0" netns="" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.365 [INFO][4761] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.365 [INFO][4761] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.409 [INFO][4767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.409 [INFO][4767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.409 [INFO][4767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.418 [WARNING][4767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.418 [INFO][4767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.420 [INFO][4767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.424812 env[1203]: 2024-12-13 15:58:34.422 [INFO][4761] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.426450 env[1203]: time="2024-12-13T15:58:34.424855230Z" level=info msg="TearDown network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" successfully" Dec 13 15:58:34.426450 env[1203]: time="2024-12-13T15:58:34.424904939Z" level=info msg="StopPodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" returns successfully" Dec 13 15:58:34.426793 env[1203]: time="2024-12-13T15:58:34.426719410Z" level=info msg="RemovePodSandbox for \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:58:34.426979 env[1203]: time="2024-12-13T15:58:34.426923730Z" level=info msg="Forcibly stopping sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\"" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.501 [WARNING][4785] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0", GenerateName:"calico-kube-controllers-7f454bbfd7-", Namespace:"calico-system", SelfLink:"", UID:"adadad57-fe17-4044-8f86-e95a257eba7f", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f454bbfd7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"396b12936819e42264081ceb1cee37f149ffa526b1d662db3c6415b09a488fc3", Pod:"calico-kube-controllers-7f454bbfd7-km4k7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0e0e29ccb5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.502 [INFO][4785] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.502 [INFO][4785] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" iface="eth0" netns="" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.502 [INFO][4785] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.502 [INFO][4785] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.571 [INFO][4795] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.572 [INFO][4795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.572 [INFO][4795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.586 [WARNING][4795] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.586 [INFO][4795] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" HandleID="k8s-pod-network.a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--kube--controllers--7f454bbfd7--km4k7-eth0" Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.589 [INFO][4795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.592622 env[1203]: 2024-12-13 15:58:34.590 [INFO][4785] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0" Dec 13 15:58:34.595094 env[1203]: time="2024-12-13T15:58:34.592577419Z" level=info msg="TearDown network for sandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" successfully" Dec 13 15:58:34.601325 env[1203]: time="2024-12-13T15:58:34.601239353Z" level=info msg="RemovePodSandbox \"a5ace5daeb0a87a18a1103c32c05645fc97d882b2b3345710e7e5d4a90ce1ad0\" returns successfully" Dec 13 15:58:34.603061 env[1203]: time="2024-12-13T15:58:34.602971617Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.662 [WARNING][4819] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7", Pod:"csi-node-driver-cqqzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali21ff49e9f25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.662 [INFO][4819] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.663 [INFO][4819] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" iface="eth0" netns="" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.663 [INFO][4819] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.663 [INFO][4819] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.708 [INFO][4825] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.708 [INFO][4825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.708 [INFO][4825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.722 [WARNING][4825] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.722 [INFO][4825] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.725 [INFO][4825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.735772 env[1203]: 2024-12-13 15:58:34.729 [INFO][4819] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.737295 env[1203]: time="2024-12-13T15:58:34.735801518Z" level=info msg="TearDown network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" successfully" Dec 13 15:58:34.737295 env[1203]: time="2024-12-13T15:58:34.735850311Z" level=info msg="StopPodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" returns successfully" Dec 13 15:58:34.738033 env[1203]: time="2024-12-13T15:58:34.737989661Z" level=info msg="RemovePodSandbox for \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:58:34.738191 env[1203]: time="2024-12-13T15:58:34.738034554Z" level=info msg="Forcibly stopping sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\"" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.799 [WARNING][4847] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"009bebc9-013c-4d7e-9ae4-7bb3c5895dc1", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"6b532642b2d0bdebfb8ad2f78719ba6c6561b7150351ecbf63e7cb57ea1e0fa7", Pod:"csi-node-driver-cqqzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali21ff49e9f25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.800 [INFO][4847] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.800 [INFO][4847] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" iface="eth0" netns="" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.800 [INFO][4847] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.800 [INFO][4847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.859 [INFO][4853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.864 [INFO][4853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.864 [INFO][4853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.877 [WARNING][4853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.877 [INFO][4853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" HandleID="k8s-pod-network.3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Workload="srv--8d9xb.gb1.brightbox.com-k8s-csi--node--driver--cqqzv-eth0" Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.880 [INFO][4853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:34.884053 env[1203]: 2024-12-13 15:58:34.882 [INFO][4847] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb" Dec 13 15:58:34.884053 env[1203]: time="2024-12-13T15:58:34.884017523Z" level=info msg="TearDown network for sandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" successfully" Dec 13 15:58:34.893156 env[1203]: time="2024-12-13T15:58:34.892697354Z" level=info msg="RemovePodSandbox \"3b407e2100bc8681f6ea8c1d3b2979705d59ae0520416fbc34e1f6da5c925bbb\" returns successfully" Dec 13 15:58:34.893880 env[1203]: time="2024-12-13T15:58:34.893502066Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:34.996 [WARNING][4874] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"91009ef9-d84c-4dac-b013-a8397dac44f7", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33", Pod:"calico-apiserver-55c688fc-6z2p6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1b490cc1100", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:34.996 [INFO][4874] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:34.996 [INFO][4874] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" iface="eth0" netns="" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:34.996 [INFO][4874] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:34.996 [INFO][4874] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.039 [INFO][4880] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.040 [INFO][4880] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.040 [INFO][4880] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.054 [WARNING][4880] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.055 [INFO][4880] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.059 [INFO][4880] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:35.067972 env[1203]: 2024-12-13 15:58:35.063 [INFO][4874] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.070621 env[1203]: time="2024-12-13T15:58:35.068398998Z" level=info msg="TearDown network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" successfully" Dec 13 15:58:35.070621 env[1203]: time="2024-12-13T15:58:35.068445378Z" level=info msg="StopPodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" returns successfully" Dec 13 15:58:35.070621 env[1203]: time="2024-12-13T15:58:35.069528025Z" level=info msg="RemovePodSandbox for \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:58:35.070621 env[1203]: time="2024-12-13T15:58:35.069570773Z" level=info msg="Forcibly stopping sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\"" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.172 [WARNING][4901] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0", GenerateName:"calico-apiserver-55c688fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"91009ef9-d84c-4dac-b013-a8397dac44f7", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 56, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55c688fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-8d9xb.gb1.brightbox.com", ContainerID:"8f629ee03b2c2bc9629f15a4f530c4f25d0f74a2b7d36c4667c7514239802f33", Pod:"calico-apiserver-55c688fc-6z2p6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1b490cc1100", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.172 [INFO][4901] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.172 [INFO][4901] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" iface="eth0" netns="" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.172 [INFO][4901] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.172 [INFO][4901] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.213 [INFO][4907] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.213 [INFO][4907] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.213 [INFO][4907] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.222 [WARNING][4907] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.222 [INFO][4907] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" HandleID="k8s-pod-network.c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Workload="srv--8d9xb.gb1.brightbox.com-k8s-calico--apiserver--55c688fc--6z2p6-eth0" Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.224 [INFO][4907] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:58:35.228541 env[1203]: 2024-12-13 15:58:35.226 [INFO][4901] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1" Dec 13 15:58:35.231163 env[1203]: time="2024-12-13T15:58:35.229051836Z" level=info msg="TearDown network for sandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" successfully" Dec 13 15:58:35.235413 env[1203]: time="2024-12-13T15:58:35.235345168Z" level=info msg="RemovePodSandbox \"c12021cb4cb68cc0c01c8f0c97a641dde5aecac6ae49d990635eb5f71de836a1\" returns successfully" Dec 13 15:58:35.483401 sshd[4696]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:35.485000 audit[4696]: USER_END pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:35.499823 kernel: audit: type=1106 audit(1734105515.485:1395): pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:35.500402 kernel: audit: type=1104 audit(1734105515.485:1396): pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:35.485000 audit[4696]: CRED_DISP pid=4696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:35.494606 systemd[1]: sshd@7-10.230.29.154:22-139.178.68.195:43630.service: Deactivated successfully. Dec 13 15:58:35.496644 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:58:35.499415 systemd-logind[1190]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:58:35.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.29.154:22-139.178.68.195:43630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:35.506992 systemd-logind[1190]: Removed session 8. Dec 13 15:58:40.632362 systemd[1]: Started sshd@8-10.230.29.154:22-139.178.68.195:41646.service. Dec 13 15:58:40.636270 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:58:40.636830 kernel: audit: type=1130 audit(1734105520.630:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.29.154:22-139.178.68.195:41646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:40.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.29.154:22-139.178.68.195:41646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:41.557000 audit[4935]: USER_ACCT pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.560010 sshd[4935]: Accepted publickey for core from 139.178.68.195 port 41646 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:41.566778 kernel: audit: type=1101 audit(1734105521.557:1399): pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.566000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.576792 kernel: audit: type=1103 audit(1734105521.566:1400): pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.578446 sshd[4935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:41.566000 audit[4935]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b047d50 a2=3 a3=0 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:41.587797 kernel: audit: type=1006 audit(1734105521.566:1401): pid=4935 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 15:58:41.587923 kernel: audit: type=1300 audit(1734105521.566:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b047d50 a2=3 a3=0 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:41.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:41.590658 kernel: audit: type=1327 audit(1734105521.566:1401): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:41.596551 systemd-logind[1190]: New session 9 of user core. Dec 13 15:58:41.598047 systemd[1]: Started session-9.scope. Dec 13 15:58:41.605000 audit[4935]: USER_START pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.615842 kernel: audit: type=1105 audit(1734105521.605:1402): pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.614000 audit[4937]: CRED_ACQ pid=4937 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:41.622789 kernel: audit: type=1103 audit(1734105521.614:1403): pid=4937 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:42.405972 sshd[4935]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:42.405000 audit[4935]: USER_END pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:42.419304 kernel: audit: type=1106 audit(1734105522.405:1404): pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:42.425643 kernel: audit: type=1104 audit(1734105522.406:1405): pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:42.406000 audit[4935]: CRED_DISP pid=4935 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:42.414230 systemd[1]: sshd@8-10.230.29.154:22-139.178.68.195:41646.service: Deactivated successfully. Dec 13 15:58:42.415567 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:58:42.418275 systemd-logind[1190]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:58:42.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.29.154:22-139.178.68.195:41646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:42.420146 systemd-logind[1190]: Removed session 9. Dec 13 15:58:43.382000 audit[4462]: AVC avc: denied { watch } for pid=4462 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.3790116906/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c563,c672 tclass=file permissive=0 Dec 13 15:58:43.382000 audit[4462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001952520 a2=fc6 a3=0 items=0 ppid=4172 pid=4462 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 key=(null) Dec 13 15:58:43.382000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:58:44.677000 audit[4503]: AVC avc: denied { watch } for pid=4503 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.4141313187/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c32,c498 tclass=file permissive=0 Dec 13 15:58:44.677000 audit[4503]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00172a780 a2=fc6 a3=0 items=0 ppid=4145 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 key=(null) Dec 13 15:58:44.677000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:58:46.446398 systemd[1]: run-containerd-runc-k8s.io-471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c-runc.Thpx82.mount: Deactivated successfully. Dec 13 15:58:47.557373 systemd[1]: Started sshd@9-10.230.29.154:22-139.178.68.195:48740.service. Dec 13 15:58:47.562708 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 15:58:47.562819 kernel: audit: type=1130 audit(1734105527.557:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.29.154:22-139.178.68.195:48740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:47.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.29.154:22-139.178.68.195:48740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:48.497789 sshd[4972]: Accepted publickey for core from 139.178.68.195 port 48740 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:48.496000 audit[4972]: USER_ACCT pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.505769 kernel: audit: type=1101 audit(1734105528.496:1410): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.506254 sshd[4972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:48.505000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.517198 kernel: audit: type=1103 audit(1734105528.505:1411): pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.517317 kernel: audit: type=1006 audit(1734105528.505:1412): pid=4972 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 15:58:48.505000 audit[4972]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ed21eb0 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:48.524122 kernel: audit: type=1300 audit(1734105528.505:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ed21eb0 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:48.527679 kernel: audit: type=1327 audit(1734105528.505:1412): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:48.505000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:48.529521 systemd-logind[1190]: New session 10 of user core. Dec 13 15:58:48.530563 systemd[1]: Started session-10.scope. Dec 13 15:58:48.538000 audit[4972]: USER_START pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.546000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.553491 kernel: audit: type=1105 audit(1734105528.538:1413): pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:48.553622 kernel: audit: type=1103 audit(1734105528.546:1414): pid=4974 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:49.250664 sshd[4972]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:49.253000 audit[4972]: USER_END pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:49.265777 kernel: audit: type=1106 audit(1734105529.253:1415): pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:49.274931 kernel: audit: type=1104 audit(1734105529.265:1416): pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:49.265000 audit[4972]: CRED_DISP pid=4972 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:49.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.29.154:22-139.178.68.195:48740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:49.269409 systemd[1]: sshd@9-10.230.29.154:22-139.178.68.195:48740.service: Deactivated successfully. Dec 13 15:58:49.271174 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:58:49.273635 systemd-logind[1190]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:58:49.276325 systemd-logind[1190]: Removed session 10. Dec 13 15:58:49.400978 systemd[1]: Started sshd@10-10.230.29.154:22-139.178.68.195:48746.service. Dec 13 15:58:49.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.29.154:22-139.178.68.195:48746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:50.298584 sshd[4985]: Accepted publickey for core from 139.178.68.195 port 48746 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:50.297000 audit[4985]: USER_ACCT pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:50.299000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:50.299000 audit[4985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0ad0ab30 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:50.299000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:50.301539 sshd[4985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:50.309467 systemd-logind[1190]: New session 11 of user core. Dec 13 15:58:50.310567 systemd[1]: Started session-11.scope. Dec 13 15:58:50.318000 audit[4985]: USER_START pid=4985 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:50.321000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:51.132853 sshd[4985]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:51.134000 audit[4985]: USER_END pid=4985 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:51.134000 audit[4985]: CRED_DISP pid=4985 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:51.136893 systemd[1]: sshd@10-10.230.29.154:22-139.178.68.195:48746.service: Deactivated successfully. Dec 13 15:58:51.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.29.154:22-139.178.68.195:48746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:51.138428 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:58:51.138518 systemd-logind[1190]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:58:51.140432 systemd-logind[1190]: Removed session 11. Dec 13 15:58:51.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.29.154:22-139.178.68.195:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:51.282445 systemd[1]: Started sshd@11-10.230.29.154:22-139.178.68.195:48748.service. Dec 13 15:58:52.186000 audit[4995]: USER_ACCT pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.187487 sshd[4995]: Accepted publickey for core from 139.178.68.195 port 48748 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:52.188000 audit[4995]: CRED_ACQ pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.188000 audit[4995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf561750 a2=3 a3=0 items=0 ppid=1 pid=4995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:52.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:52.189559 sshd[4995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:52.198811 systemd[1]: Started session-12.scope. Dec 13 15:58:52.199369 systemd-logind[1190]: New session 12 of user core. Dec 13 15:58:52.206000 audit[4995]: USER_START pid=4995 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.209000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.956247 sshd[4995]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:52.963956 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:58:52.964137 kernel: audit: type=1106 audit(1734105532.957:1433): pid=4995 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.957000 audit[4995]: USER_END pid=4995 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.969384 systemd[1]: sshd@11-10.230.29.154:22-139.178.68.195:48748.service: Deactivated successfully. Dec 13 15:58:52.971324 kernel: audit: type=1104 audit(1734105532.957:1434): pid=4995 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.957000 audit[4995]: CRED_DISP pid=4995 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:52.970618 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 15:58:52.972908 systemd-logind[1190]: Session 12 logged out. Waiting for processes to exit. Dec 13 15:58:52.974633 systemd-logind[1190]: Removed session 12. Dec 13 15:58:52.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.29.154:22-139.178.68.195:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:52.983600 kernel: audit: type=1131 audit(1734105532.968:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.29.154:22-139.178.68.195:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:58.105160 systemd[1]: Started sshd@12-10.230.29.154:22-139.178.68.195:59922.service. Dec 13 15:58:58.116898 kernel: audit: type=1130 audit(1734105538.105:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.29.154:22-139.178.68.195:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:58.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.29.154:22-139.178.68.195:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:59.046000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.058154 sshd[5015]: Accepted publickey for core from 139.178.68.195 port 59922 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:58:59.059566 kernel: audit: type=1101 audit(1734105539.046:1437): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.059683 kernel: audit: type=1103 audit(1734105539.057:1438): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.057000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.060518 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:59.069415 kernel: audit: type=1006 audit(1734105539.057:1439): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 15:58:59.070042 kernel: audit: type=1300 audit(1734105539.057:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc553bfa90 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.057000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc553bfa90 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:59.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:59.081771 kernel: audit: type=1327 audit(1734105539.057:1439): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:59.082770 systemd-logind[1190]: New session 13 of user core. Dec 13 15:58:59.083501 systemd[1]: Started session-13.scope. Dec 13 15:58:59.092000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.100813 kernel: audit: type=1105 audit(1734105539.092:1440): pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.102591 kernel: audit: type=1103 audit(1734105539.100:1441): pid=5028 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.100000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.885387 sshd[5015]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:59.888000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.900407 kernel: audit: type=1106 audit(1734105539.888:1442): pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.899000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.907770 kernel: audit: type=1104 audit(1734105539.899:1443): pid=5015 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:58:59.917290 systemd[1]: sshd@12-10.230.29.154:22-139.178.68.195:59922.service: Deactivated successfully. Dec 13 15:58:59.918593 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 15:58:59.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.29.154:22-139.178.68.195:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:59.920922 systemd-logind[1190]: Session 13 logged out. Waiting for processes to exit. Dec 13 15:58:59.923108 systemd-logind[1190]: Removed session 13. Dec 13 15:59:05.028064 systemd[1]: Started sshd@13-10.230.29.154:22-139.178.68.195:59938.service. Dec 13 15:59:05.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.29.154:22-139.178.68.195:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:05.032136 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:05.032553 kernel: audit: type=1130 audit(1734105545.028:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.29.154:22-139.178.68.195:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:05.923000 audit[5064]: USER_ACCT pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.924642 sshd[5064]: Accepted publickey for core from 139.178.68.195 port 59938 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:05.931784 kernel: audit: type=1101 audit(1734105545.923:1446): pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.932350 kernel: audit: type=1103 audit(1734105545.930:1447): pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.930000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.932246 sshd[5064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:05.944158 kernel: audit: type=1006 audit(1734105545.930:1448): pid=5064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 15:59:05.944273 kernel: audit: type=1300 audit(1734105545.930:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb76e6b30 a2=3 a3=0 items=0 ppid=1 pid=5064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:05.930000 audit[5064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb76e6b30 a2=3 a3=0 items=0 ppid=1 pid=5064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:05.941322 systemd[1]: Started session-14.scope. Dec 13 15:59:05.943256 systemd-logind[1190]: New session 14 of user core. Dec 13 15:59:05.951359 kernel: audit: type=1327 audit(1734105545.930:1448): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:05.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:05.954650 kernel: audit: type=1105 audit(1734105545.953:1449): pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.953000 audit[5064]: USER_START pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.956000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:05.968570 kernel: audit: type=1103 audit(1734105545.956:1450): pid=5066 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:06.772080 sshd[5064]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:06.773000 audit[5064]: USER_END pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:06.779310 systemd[1]: sshd@13-10.230.29.154:22-139.178.68.195:59938.service: Deactivated successfully. Dec 13 15:59:06.783981 systemd-logind[1190]: Session 14 logged out. Waiting for processes to exit. Dec 13 15:59:06.773000 audit[5064]: CRED_DISP pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:06.786316 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 15:59:06.789851 systemd-logind[1190]: Removed session 14. Dec 13 15:59:06.792714 kernel: audit: type=1106 audit(1734105546.773:1451): pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:06.792866 kernel: audit: type=1104 audit(1734105546.773:1452): pid=5064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:06.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.29.154:22-139.178.68.195:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:11.922430 systemd[1]: Started sshd@14-10.230.29.154:22-139.178.68.195:45776.service. Dec 13 15:59:11.934293 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:11.934387 kernel: audit: type=1130 audit(1734105551.922:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.29.154:22-139.178.68.195:45776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:11.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.29.154:22-139.178.68.195:45776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:12.833000 audit[5096]: USER_ACCT pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.842524 sshd[5096]: Accepted publickey for core from 139.178.68.195 port 45776 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:12.844798 kernel: audit: type=1101 audit(1734105552.833:1455): pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.847095 sshd[5096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:12.845000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.854770 kernel: audit: type=1103 audit(1734105552.845:1456): pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.869539 kernel: audit: type=1006 audit(1734105552.845:1457): pid=5096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 15:59:12.869647 kernel: audit: type=1300 audit(1734105552.845:1457): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3cb512e0 a2=3 a3=0 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:12.869719 kernel: audit: type=1327 audit(1734105552.845:1457): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:12.845000 audit[5096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3cb512e0 a2=3 a3=0 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:12.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:12.865922 systemd[1]: Started session-15.scope. Dec 13 15:59:12.868535 systemd-logind[1190]: New session 15 of user core. Dec 13 15:59:12.883000 audit[5096]: USER_START pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.894451 kernel: audit: type=1105 audit(1734105552.883:1458): pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.894559 kernel: audit: type=1103 audit(1734105552.890:1459): pid=5098 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:12.890000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:13.657887 sshd[5096]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:13.659000 audit[5096]: USER_END pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:13.675954 kernel: audit: type=1106 audit(1734105553.659:1460): pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:13.676800 kernel: audit: type=1104 audit(1734105553.660:1461): pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:13.660000 audit[5096]: CRED_DISP pid=5096 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:13.673339 systemd[1]: sshd@14-10.230.29.154:22-139.178.68.195:45776.service: Deactivated successfully. Dec 13 15:59:13.675230 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 15:59:13.678139 systemd-logind[1190]: Session 15 logged out. Waiting for processes to exit. Dec 13 15:59:13.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.29.154:22-139.178.68.195:45776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:13.680902 systemd-logind[1190]: Removed session 15. Dec 13 15:59:13.809874 systemd[1]: Started sshd@15-10.230.29.154:22-139.178.68.195:45780.service. Dec 13 15:59:13.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.29.154:22-139.178.68.195:45780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:14.698348 sshd[5107]: Accepted publickey for core from 139.178.68.195 port 45780 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:14.697000 audit[5107]: USER_ACCT pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:14.700000 audit[5107]: CRED_ACQ pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:14.701000 audit[5107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1f1e850 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:14.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:14.702427 sshd[5107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:14.712441 systemd[1]: Started session-16.scope. Dec 13 15:59:14.713163 systemd-logind[1190]: New session 16 of user core. Dec 13 15:59:14.721000 audit[5107]: USER_START pid=5107 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:14.724000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:15.925840 sshd[5107]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:15.929000 audit[5107]: USER_END pid=5107 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:15.929000 audit[5107]: CRED_DISP pid=5107 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:15.932348 systemd[1]: sshd@15-10.230.29.154:22-139.178.68.195:45780.service: Deactivated successfully. Dec 13 15:59:15.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.29.154:22-139.178.68.195:45780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:15.933470 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 15:59:15.934375 systemd-logind[1190]: Session 16 logged out. Waiting for processes to exit. Dec 13 15:59:15.935989 systemd-logind[1190]: Removed session 16. Dec 13 15:59:16.075005 systemd[1]: Started sshd@16-10.230.29.154:22-139.178.68.195:45784.service. Dec 13 15:59:16.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.29.154:22-139.178.68.195:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:16.972829 sshd[5116]: Accepted publickey for core from 139.178.68.195 port 45784 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:16.971000 audit[5116]: USER_ACCT pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:16.977683 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 15:59:16.977850 kernel: audit: type=1101 audit(1734105556.971:1473): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:16.983000 audit[5116]: CRED_ACQ pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:16.985437 sshd[5116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:16.991203 kernel: audit: type=1103 audit(1734105556.983:1474): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:16.983000 audit[5116]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85050710 a2=3 a3=0 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:17.019588 kernel: audit: type=1006 audit(1734105556.983:1475): pid=5116 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 15:59:17.019692 kernel: audit: type=1300 audit(1734105556.983:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85050710 a2=3 a3=0 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:17.019751 kernel: audit: type=1327 audit(1734105556.983:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:16.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:17.019086 systemd[1]: Started session-17.scope. Dec 13 15:59:17.020851 systemd-logind[1190]: New session 17 of user core. Dec 13 15:59:17.030000 audit[5116]: USER_START pid=5116 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:17.039834 kernel: audit: type=1105 audit(1734105557.030:1476): pid=5116 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:17.039000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:17.046772 kernel: audit: type=1103 audit(1734105557.039:1477): pid=5120 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:20.401000 audit[5130]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.401000 audit[5130]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc18f34ed0 a2=0 a3=7ffc18f34ebc items=0 ppid=2245 pid=5130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.415332 kernel: audit: type=1325 audit(1734105560.401:1478): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.415806 kernel: audit: type=1300 audit(1734105560.401:1478): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc18f34ed0 a2=0 a3=7ffc18f34ebc items=0 ppid=2245 pid=5130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.420781 kernel: audit: type=1327 audit(1734105560.401:1478): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.417000 audit[5130]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.417000 audit[5130]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc18f34ed0 a2=0 a3=0 items=0 ppid=2245 pid=5130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.463000 audit[5132]: NETFILTER_CFG table=filter:124 family=2 entries=32 op=nft_register_rule pid=5132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.463000 audit[5132]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe182ce0b0 a2=0 a3=7ffe182ce09c items=0 ppid=2245 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.470000 audit[5132]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:20.470000 audit[5132]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe182ce0b0 a2=0 a3=0 items=0 ppid=2245 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:20.521347 sshd[5116]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:20.530000 audit[5116]: USER_END pid=5116 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:20.531000 audit[5116]: CRED_DISP pid=5116 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:20.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.29.154:22-139.178.68.195:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:20.545282 systemd[1]: sshd@16-10.230.29.154:22-139.178.68.195:45784.service: Deactivated successfully. Dec 13 15:59:20.546716 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 15:59:20.547077 systemd[1]: session-17.scope: Consumed 1.056s CPU time. Dec 13 15:59:20.548069 systemd-logind[1190]: Session 17 logged out. Waiting for processes to exit. Dec 13 15:59:20.550033 systemd-logind[1190]: Removed session 17. Dec 13 15:59:20.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.29.154:22-139.178.68.195:34246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:20.663338 systemd[1]: Started sshd@17-10.230.29.154:22-139.178.68.195:34246.service. Dec 13 15:59:21.570577 sshd[5135]: Accepted publickey for core from 139.178.68.195 port 34246 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:21.569000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:21.571000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:21.571000 audit[5135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd05fc2200 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:21.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:21.574121 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:21.581647 systemd-logind[1190]: New session 18 of user core. Dec 13 15:59:21.583684 systemd[1]: Started session-18.scope. Dec 13 15:59:21.592000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:21.595000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:23.016298 sshd[5135]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:23.033819 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:59:23.042695 kernel: audit: type=1106 audit(1734105563.018:1491): pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:23.042785 kernel: audit: type=1104 audit(1734105563.018:1492): pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:23.018000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:23.018000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:23.021389 systemd[1]: sshd@17-10.230.29.154:22-139.178.68.195:34246.service: Deactivated successfully. Dec 13 15:59:23.033841 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 15:59:23.042054 systemd-logind[1190]: Session 18 logged out. Waiting for processes to exit. Dec 13 15:59:23.044562 systemd-logind[1190]: Removed session 18. Dec 13 15:59:23.051835 kernel: audit: type=1131 audit(1734105563.023:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.29.154:22-139.178.68.195:34246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:23.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.29.154:22-139.178.68.195:34246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:23.162291 systemd[1]: Started sshd@18-10.230.29.154:22-139.178.68.195:34262.service. Dec 13 15:59:23.170048 kernel: audit: type=1130 audit(1734105563.161:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.29.154:22-139.178.68.195:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:23.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.29.154:22-139.178.68.195:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:24.065000 audit[5145]: USER_ACCT pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.075711 sshd[5145]: Accepted publickey for core from 139.178.68.195 port 34262 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:24.077334 kernel: audit: type=1101 audit(1734105564.065:1495): pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.077681 sshd[5145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:24.075000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.089580 kernel: audit: type=1103 audit(1734105564.075:1496): pid=5145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.089790 kernel: audit: type=1006 audit(1734105564.075:1497): pid=5145 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 15:59:24.075000 audit[5145]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0a323660 a2=3 a3=0 items=0 ppid=1 pid=5145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:24.097910 kernel: audit: type=1300 audit(1734105564.075:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0a323660 a2=3 a3=0 items=0 ppid=1 pid=5145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:24.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:24.100786 kernel: audit: type=1327 audit(1734105564.075:1497): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:24.104247 systemd-logind[1190]: New session 19 of user core. Dec 13 15:59:24.106041 systemd[1]: Started session-19.scope. Dec 13 15:59:24.113000 audit[5145]: USER_START pid=5145 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.122895 kernel: audit: type=1105 audit(1734105564.113:1498): pid=5145 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.114000 audit[5147]: CRED_ACQ pid=5147 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.836938 sshd[5145]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:24.837000 audit[5145]: USER_END pid=5145 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.838000 audit[5145]: CRED_DISP pid=5145 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:24.841198 systemd[1]: sshd@18-10.230.29.154:22-139.178.68.195:34262.service: Deactivated successfully. Dec 13 15:59:24.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.29.154:22-139.178.68.195:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:24.842429 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 15:59:24.843806 systemd-logind[1190]: Session 19 logged out. Waiting for processes to exit. Dec 13 15:59:24.845523 systemd-logind[1190]: Removed session 19. Dec 13 15:59:26.593000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:26.593000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:26.593000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027d2da0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:26.593000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:26.593000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ddc5d0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:26.593000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:27.163000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.163000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.163000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c016502ec0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:27.163000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012c5d350 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:27.165000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.165000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c016502ee0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:27.170000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.170000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012c5d3e0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:27.172000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.172000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012c45ef0 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.172000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:27.172000 audit[1943]: AVC avc: denied { watch } for pid=1943 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:27.172000 audit[1943]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012c45f50 a2=fc6 a3=0 items=0 ppid=1767 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c999 key=(null) Dec 13 15:59:27.172000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E32392E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:59:28.146996 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 15:59:28.148449 kernel: audit: type=1325 audit(1734105568.140:1511): table=filter:126 family=2 entries=20 op=nft_register_rule pid=5157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.140000 audit[5157]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.140000 audit[5157]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcbc6adfb0 a2=0 a3=7ffcbc6adf9c items=0 ppid=2245 pid=5157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:28.163813 kernel: audit: type=1300 audit(1734105568.140:1511): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcbc6adfb0 a2=0 a3=7ffcbc6adf9c items=0 ppid=2245 pid=5157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.163911 kernel: audit: type=1327 audit(1734105568.140:1511): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:28.163000 audit[5157]: NETFILTER_CFG table=nat:127 family=2 entries=106 op=nft_register_chain pid=5157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.163000 audit[5157]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcbc6adfb0 a2=0 a3=7ffcbc6adf9c items=0 ppid=2245 pid=5157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.178666 kernel: audit: type=1325 audit(1734105568.163:1512): table=nat:127 family=2 entries=106 op=nft_register_chain pid=5157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:28.178792 kernel: audit: type=1300 audit(1734105568.163:1512): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcbc6adfb0 a2=0 a3=7ffcbc6adf9c items=0 ppid=2245 pid=5157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:28.178853 kernel: audit: type=1327 audit(1734105568.163:1512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:28.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:29.986688 systemd[1]: Started sshd@19-10.230.29.154:22-139.178.68.195:45124.service. Dec 13 15:59:29.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.29.154:22-139.178.68.195:45124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:29.997775 kernel: audit: type=1130 audit(1734105569.986:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.29.154:22-139.178.68.195:45124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:30.910148 sshd[5182]: Accepted publickey for core from 139.178.68.195 port 45124 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:30.909000 audit[5182]: USER_ACCT pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:30.927171 kernel: audit: type=1101 audit(1734105570.909:1514): pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:30.927626 kernel: audit: type=1103 audit(1734105570.916:1515): pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:30.916000 audit[5182]: CRED_ACQ pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:30.933262 sshd[5182]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:30.933978 kernel: audit: type=1006 audit(1734105570.916:1516): pid=5182 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 15:59:30.916000 audit[5182]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe044fdec0 a2=3 a3=0 items=0 ppid=1 pid=5182 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:30.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:30.933000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:30.933000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c97f20 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:30.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:30.933000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:30.933000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004dddc0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:30.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:30.934000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:30.934000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004ddfe0 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:30.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:30.939000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:59:30.939000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f94260 a2=fc6 a3=0 items=0 ppid=1778 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c428 key=(null) Dec 13 15:59:30.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:59:30.947864 systemd-logind[1190]: New session 20 of user core. Dec 13 15:59:30.948327 systemd[1]: Started session-20.scope. Dec 13 15:59:30.956000 audit[5182]: USER_START pid=5182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:30.959000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:31.737117 sshd[5182]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:31.739000 audit[5182]: USER_END pid=5182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:31.739000 audit[5182]: CRED_DISP pid=5182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:31.742470 systemd[1]: sshd@19-10.230.29.154:22-139.178.68.195:45124.service: Deactivated successfully. Dec 13 15:59:31.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.29.154:22-139.178.68.195:45124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:31.743995 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 15:59:31.744849 systemd-logind[1190]: Session 20 logged out. Waiting for processes to exit. Dec 13 15:59:31.746052 systemd-logind[1190]: Removed session 20. Dec 13 15:59:36.900726 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 15:59:36.900969 kernel: audit: type=1130 audit(1734105576.888:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.29.154:22-139.178.68.195:54092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:36.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.29.154:22-139.178.68.195:54092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:36.889362 systemd[1]: Started sshd@20-10.230.29.154:22-139.178.68.195:54092.service. Dec 13 15:59:37.828122 sshd[5195]: Accepted publickey for core from 139.178.68.195 port 54092 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:37.827000 audit[5195]: USER_ACCT pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.839884 kernel: audit: type=1101 audit(1734105577.827:1527): pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.840000 audit[5195]: CRED_ACQ pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.851765 kernel: audit: type=1103 audit(1734105577.840:1528): pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.851867 kernel: audit: type=1006 audit(1734105577.840:1529): pid=5195 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 15:59:37.851950 kernel: audit: type=1300 audit(1734105577.840:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a0c8cb0 a2=3 a3=0 items=0 ppid=1 pid=5195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.840000 audit[5195]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a0c8cb0 a2=3 a3=0 items=0 ppid=1 pid=5195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:37.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:37.861773 kernel: audit: type=1327 audit(1734105577.840:1529): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:37.862608 sshd[5195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:37.873571 systemd-logind[1190]: New session 21 of user core. Dec 13 15:59:37.873846 systemd[1]: Started session-21.scope. Dec 13 15:59:37.891010 kernel: audit: type=1105 audit(1734105577.882:1530): pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.882000 audit[5195]: USER_START pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.891000 audit[5197]: CRED_ACQ pid=5197 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:37.898775 kernel: audit: type=1103 audit(1734105577.891:1531): pid=5197 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:38.733613 sshd[5195]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:38.741000 audit[5195]: USER_END pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:38.753950 kernel: audit: type=1106 audit(1734105578.741:1532): pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:38.758331 systemd[1]: sshd@20-10.230.29.154:22-139.178.68.195:54092.service: Deactivated successfully. Dec 13 15:59:38.760823 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 15:59:38.742000 audit[5195]: CRED_DISP pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:38.767844 kernel: audit: type=1104 audit(1734105578.742:1533): pid=5195 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:38.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.29.154:22-139.178.68.195:54092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:38.771295 systemd-logind[1190]: Session 21 logged out. Waiting for processes to exit. Dec 13 15:59:38.773015 systemd-logind[1190]: Removed session 21. Dec 13 15:59:43.388000 audit[4462]: AVC avc: denied { watch } for pid=4462 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.3790116906/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c563,c672 tclass=file permissive=0 Dec 13 15:59:43.392187 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:43.392751 kernel: audit: type=1400 audit(1734105583.388:1535): avc: denied { watch } for pid=4462 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.3790116906/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c563,c672 tclass=file permissive=0 Dec 13 15:59:43.388000 audit[4462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b14e20 a2=fc6 a3=0 items=0 ppid=4172 pid=4462 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 key=(null) Dec 13 15:59:43.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:59:43.415700 kernel: audit: type=1300 audit(1734105583.388:1535): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b14e20 a2=fc6 a3=0 items=0 ppid=4172 pid=4462 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c672 key=(null) Dec 13 15:59:43.415835 kernel: audit: type=1327 audit(1734105583.388:1535): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:59:43.885035 systemd[1]: Started sshd@21-10.230.29.154:22-139.178.68.195:54104.service. Dec 13 15:59:43.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.29.154:22-139.178.68.195:54104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:43.891770 kernel: audit: type=1130 audit(1734105583.884:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.29.154:22-139.178.68.195:54104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:44.680000 audit[4503]: AVC avc: denied { watch } for pid=4503 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.4141313187/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c32,c498 tclass=file permissive=0 Dec 13 15:59:44.680000 audit[4503]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00172a000 a2=fc6 a3=0 items=0 ppid=4145 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 key=(null) Dec 13 15:59:44.697125 kernel: audit: type=1400 audit(1734105584.680:1537): avc: denied { watch } for pid=4503 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_57_08.4141313187/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c32,c498 tclass=file permissive=0 Dec 13 15:59:44.697233 kernel: audit: type=1300 audit(1734105584.680:1537): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00172a000 a2=fc6 a3=0 items=0 ppid=4145 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c32,c498 key=(null) Dec 13 15:59:44.697298 kernel: audit: type=1327 audit(1734105584.680:1537): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:59:44.680000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:59:44.800049 sshd[5229]: Accepted publickey for core from 139.178.68.195 port 54104 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:59:44.799000 audit[5229]: USER_ACCT pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:44.809889 kernel: audit: type=1101 audit(1734105584.799:1538): pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:44.810590 sshd[5229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:44.807000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:44.818767 kernel: audit: type=1103 audit(1734105584.807:1539): pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:44.824766 kernel: audit: type=1006 audit(1734105584.808:1540): pid=5229 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 15:59:44.827100 systemd-logind[1190]: New session 22 of user core. Dec 13 15:59:44.828466 systemd[1]: Started session-22.scope. Dec 13 15:59:44.808000 audit[5229]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7e5df5e0 a2=3 a3=0 items=0 ppid=1 pid=5229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:44.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:44.836000 audit[5229]: USER_START pid=5229 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:44.839000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:45.574486 sshd[5229]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:45.575000 audit[5229]: USER_END pid=5229 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:45.575000 audit[5229]: CRED_DISP pid=5229 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:59:45.581119 systemd[1]: sshd@21-10.230.29.154:22-139.178.68.195:54104.service: Deactivated successfully. Dec 13 15:59:45.582252 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 15:59:45.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.29.154:22-139.178.68.195:54104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:45.583349 systemd-logind[1190]: Session 22 logged out. Waiting for processes to exit. Dec 13 15:59:45.585586 systemd-logind[1190]: Removed session 22. Dec 13 15:59:46.446342 systemd[1]: run-containerd-runc-k8s.io-471ec3f08107b70beb7ed13fcc3498d1ecd71670d9f3ea2064ce49547342da6c-runc.QIybRS.mount: Deactivated successfully.