Dec 13 16:04:13.881197 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 16:04:13.881220 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 16:04:13.881233 kernel: BIOS-provided physical RAM map: Dec 13 16:04:13.881240 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 16:04:13.881247 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 16:04:13.881253 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 16:04:13.881262 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 16:04:13.881269 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 16:04:13.881276 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 16:04:13.881283 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 16:04:13.881292 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 16:04:13.881299 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 16:04:13.881306 kernel: NX (Execute Disable) protection: active Dec 13 16:04:13.881314 kernel: SMBIOS 2.8 present. Dec 13 16:04:13.881323 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 16:04:13.881338 kernel: Hypervisor detected: KVM Dec 13 16:04:13.881349 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 16:04:13.881356 kernel: kvm-clock: cpu 0, msr 5319a001, primary cpu clock Dec 13 16:04:13.881364 kernel: kvm-clock: using sched offset of 4142710765 cycles Dec 13 16:04:13.881373 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 16:04:13.881381 kernel: tsc: Detected 2294.608 MHz processor Dec 13 16:04:13.881389 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 16:04:13.881397 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 16:04:13.881405 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 16:04:13.881413 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 16:04:13.881423 kernel: Using GB pages for direct mapping Dec 13 16:04:13.881431 kernel: ACPI: Early table checksum verification disabled Dec 13 16:04:13.881439 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 16:04:13.881447 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881455 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881463 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881471 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 16:04:13.881479 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881486 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881496 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881504 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 16:04:13.881512 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 16:04:13.881520 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 16:04:13.881528 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 16:04:13.881536 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 16:04:13.881548 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 16:04:13.881559 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 16:04:13.881567 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 16:04:13.881576 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 16:04:13.881584 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 16:04:13.881593 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 16:04:13.881601 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 16:04:13.881609 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 16:04:13.881620 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 16:04:13.881628 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 16:04:13.881636 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 16:04:13.881645 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 16:04:13.881653 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 16:04:13.881661 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 16:04:13.881670 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 16:04:13.881678 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 16:04:13.881686 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 16:04:13.881695 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 16:04:13.881705 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 16:04:13.881714 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 16:04:13.881722 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 16:04:13.881731 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 16:04:13.881739 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 16:04:13.881748 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 16:04:13.881757 kernel: Zone ranges: Dec 13 16:04:13.881765 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 16:04:13.881774 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 16:04:13.881784 kernel: Normal empty Dec 13 16:04:13.881793 kernel: Movable zone start for each node Dec 13 16:04:13.881801 kernel: Early memory node ranges Dec 13 16:04:13.881810 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 16:04:13.881818 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 16:04:13.881827 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 16:04:13.881836 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 16:04:13.881844 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 16:04:13.881852 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 16:04:13.881863 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 16:04:13.881872 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 16:04:13.881880 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 16:04:13.881889 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 16:04:13.881897 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 16:04:13.881906 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 16:04:13.881914 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 16:04:13.881923 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 16:04:13.881931 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 16:04:13.881942 kernel: TSC deadline timer available Dec 13 16:04:13.881950 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 16:04:13.881959 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 16:04:13.881967 kernel: Booting paravirtualized kernel on KVM Dec 13 16:04:13.881976 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 16:04:13.881985 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 16:04:13.881994 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 16:04:13.882002 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 16:04:13.882011 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 16:04:13.882021 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 16:04:13.882030 kernel: kvm-guest: PV spinlocks enabled Dec 13 16:04:13.882046 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 16:04:13.882055 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 16:04:13.885063 kernel: Policy zone: DMA32 Dec 13 16:04:13.885085 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 16:04:13.885096 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 16:04:13.885105 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 16:04:13.885119 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 16:04:13.885128 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 16:04:13.885142 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 16:04:13.885154 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 16:04:13.885163 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 16:04:13.885172 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 16:04:13.885180 kernel: rcu: Hierarchical RCU implementation. Dec 13 16:04:13.885190 kernel: rcu: RCU event tracing is enabled. Dec 13 16:04:13.885199 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 16:04:13.885211 kernel: Rude variant of Tasks RCU enabled. Dec 13 16:04:13.885220 kernel: Tracing variant of Tasks RCU enabled. Dec 13 16:04:13.885238 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 16:04:13.885246 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 16:04:13.885254 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 16:04:13.885261 kernel: random: crng init done Dec 13 16:04:13.885269 kernel: Console: colour VGA+ 80x25 Dec 13 16:04:13.885287 kernel: printk: console [tty0] enabled Dec 13 16:04:13.885295 kernel: printk: console [ttyS0] enabled Dec 13 16:04:13.885303 kernel: ACPI: Core revision 20210730 Dec 13 16:04:13.885312 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 16:04:13.885320 kernel: x2apic enabled Dec 13 16:04:13.885336 kernel: Switched APIC routing to physical x2apic. Dec 13 16:04:13.885345 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Dec 13 16:04:13.885353 kernel: Calibrating delay loop (skipped) preset value.. 4589.21 BogoMIPS (lpj=2294608) Dec 13 16:04:13.885362 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 16:04:13.885370 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 16:04:13.885380 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 16:04:13.885388 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 16:04:13.885396 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 16:04:13.885405 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 16:04:13.885413 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 16:04:13.885421 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 16:04:13.885429 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 16:04:13.885437 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 16:04:13.885445 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 16:04:13.885453 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 16:04:13.885464 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 16:04:13.885472 kernel: TAA: Mitigation: Clear CPU buffers Dec 13 16:04:13.885480 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 16:04:13.885488 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 16:04:13.885497 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 16:04:13.885505 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 16:04:13.885513 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 16:04:13.885521 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 16:04:13.885529 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 16:04:13.885537 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 16:04:13.885545 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 16:04:13.885556 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 16:04:13.885564 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 16:04:13.885572 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 16:04:13.885580 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 16:04:13.885588 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Dec 13 16:04:13.885597 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Dec 13 16:04:13.885605 kernel: Freeing SMP alternatives memory: 32K Dec 13 16:04:13.885613 kernel: pid_max: default: 32768 minimum: 301 Dec 13 16:04:13.885621 kernel: LSM: Security Framework initializing Dec 13 16:04:13.885629 kernel: SELinux: Initializing. Dec 13 16:04:13.885637 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 16:04:13.885645 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 16:04:13.885656 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Dec 13 16:04:13.885664 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 16:04:13.885672 kernel: signal: max sigframe size: 3632 Dec 13 16:04:13.885696 kernel: rcu: Hierarchical SRCU implementation. Dec 13 16:04:13.885705 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 16:04:13.885715 kernel: smp: Bringing up secondary CPUs ... Dec 13 16:04:13.885724 kernel: x86: Booting SMP configuration: Dec 13 16:04:13.885733 kernel: .... node #0, CPUs: #1 Dec 13 16:04:13.885742 kernel: kvm-clock: cpu 1, msr 5319a041, secondary cpu clock Dec 13 16:04:13.885753 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 16:04:13.885762 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 16:04:13.885771 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 16:04:13.885780 kernel: smpboot: Max logical packages: 16 Dec 13 16:04:13.885790 kernel: smpboot: Total of 2 processors activated (9178.43 BogoMIPS) Dec 13 16:04:13.885799 kernel: devtmpfs: initialized Dec 13 16:04:13.885808 kernel: x86/mm: Memory block size: 128MB Dec 13 16:04:13.885817 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 16:04:13.885826 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 16:04:13.885838 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 16:04:13.885847 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 16:04:13.885856 kernel: audit: initializing netlink subsys (disabled) Dec 13 16:04:13.885865 kernel: audit: type=2000 audit(1734105852.670:1): state=initialized audit_enabled=0 res=1 Dec 13 16:04:13.885874 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 16:04:13.885883 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 16:04:13.885892 kernel: cpuidle: using governor menu Dec 13 16:04:13.885901 kernel: ACPI: bus type PCI registered Dec 13 16:04:13.885911 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 16:04:13.885920 kernel: dca service started, version 1.12.1 Dec 13 16:04:13.885931 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 16:04:13.885940 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 16:04:13.885949 kernel: PCI: Using configuration type 1 for base access Dec 13 16:04:13.885958 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 16:04:13.885968 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 16:04:13.885977 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 16:04:13.885986 kernel: ACPI: Added _OSI(Module Device) Dec 13 16:04:13.885995 kernel: ACPI: Added _OSI(Processor Device) Dec 13 16:04:13.886006 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 16:04:13.886015 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 16:04:13.886024 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 16:04:13.886033 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 16:04:13.886042 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 16:04:13.886082 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 16:04:13.886092 kernel: ACPI: Interpreter enabled Dec 13 16:04:13.886101 kernel: ACPI: PM: (supports S0 S5) Dec 13 16:04:13.886110 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 16:04:13.886120 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 16:04:13.886131 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 16:04:13.886141 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 16:04:13.886301 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 16:04:13.886398 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 16:04:13.886481 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 16:04:13.886494 kernel: PCI host bridge to bus 0000:00 Dec 13 16:04:13.886581 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 16:04:13.886660 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 16:04:13.886734 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 16:04:13.886808 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 16:04:13.886881 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 16:04:13.886953 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 16:04:13.887026 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 16:04:13.887133 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 16:04:13.887227 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 16:04:13.887313 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 16:04:13.887406 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 16:04:13.887489 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 16:04:13.887576 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 16:04:13.887667 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.887776 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 16:04:13.887878 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.887965 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 16:04:13.888078 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.888171 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 16:04:13.888260 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.888356 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 16:04:13.888449 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.888537 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 16:04:13.888625 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.888709 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 16:04:13.888798 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.888887 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 16:04:13.888975 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 16:04:13.893098 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 16:04:13.893211 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 16:04:13.893301 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 16:04:13.893395 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 16:04:13.893484 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 16:04:13.893574 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 16:04:13.893669 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 16:04:13.893758 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 16:04:13.893842 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 16:04:13.893925 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 16:04:13.894018 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 16:04:13.894180 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 16:04:13.894275 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 16:04:13.894364 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 16:04:13.894447 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 16:04:13.894539 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 16:04:13.894621 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 16:04:13.894714 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 16:04:13.894804 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 16:04:13.894887 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 16:04:13.894971 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 16:04:13.897120 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 16:04:13.897244 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 16:04:13.897361 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 16:04:13.897463 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 16:04:13.897554 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 16:04:13.897643 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 16:04:13.897737 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 16:04:13.897825 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 16:04:13.897911 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 16:04:13.897995 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 16:04:13.898131 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 16:04:13.898225 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 16:04:13.898313 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 16:04:13.898406 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 16:04:13.898488 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 16:04:13.898571 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 16:04:13.898654 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 16:04:13.898736 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 16:04:13.898829 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 16:04:13.898904 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 16:04:13.898978 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 16:04:13.901097 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 16:04:13.901215 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 16:04:13.901307 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 16:04:13.901404 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 16:04:13.901491 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 16:04:13.901580 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 16:04:13.901663 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 16:04:13.901747 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 16:04:13.901830 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 16:04:13.901914 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 16:04:13.901926 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 16:04:13.901936 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 16:04:13.901946 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 16:04:13.901958 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 16:04:13.901967 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 16:04:13.901976 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 16:04:13.901986 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 16:04:13.901995 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 16:04:13.902004 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 16:04:13.902013 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 16:04:13.902022 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 16:04:13.902031 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 16:04:13.902083 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 16:04:13.902093 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 16:04:13.902102 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 16:04:13.902111 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 16:04:13.902121 kernel: iommu: Default domain type: Translated Dec 13 16:04:13.902130 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 16:04:13.902214 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 16:04:13.902299 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 16:04:13.902390 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 16:04:13.902402 kernel: vgaarb: loaded Dec 13 16:04:13.902412 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 16:04:13.902421 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 16:04:13.902430 kernel: PTP clock support registered Dec 13 16:04:13.902440 kernel: PCI: Using ACPI for IRQ routing Dec 13 16:04:13.902449 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 16:04:13.902459 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 16:04:13.902468 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 16:04:13.902480 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 16:04:13.902489 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 16:04:13.902498 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 16:04:13.902507 kernel: pnp: PnP ACPI init Dec 13 16:04:13.902602 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 16:04:13.902616 kernel: pnp: PnP ACPI: found 5 devices Dec 13 16:04:13.902625 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 16:04:13.902635 kernel: NET: Registered PF_INET protocol family Dec 13 16:04:13.902647 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 16:04:13.902656 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 16:04:13.902665 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 16:04:13.902675 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 16:04:13.902684 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 16:04:13.902693 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 16:04:13.902703 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 16:04:13.902712 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 16:04:13.902721 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 16:04:13.902733 kernel: NET: Registered PF_XDP protocol family Dec 13 16:04:13.902816 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 16:04:13.902900 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 16:04:13.902983 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 16:04:13.903074 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 16:04:13.903159 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 16:04:13.903245 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 16:04:13.903333 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 16:04:13.903418 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 16:04:13.903501 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 16:04:13.903583 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 16:04:13.903666 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 16:04:13.903748 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 16:04:13.903848 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 16:04:13.903933 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 16:04:13.904016 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 16:04:13.904106 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 16:04:13.904195 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 16:04:13.904282 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 16:04:13.904374 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 16:04:13.904458 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 16:04:13.904546 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 16:04:13.904629 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 16:04:13.904711 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 16:04:13.904794 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 16:04:13.904877 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 16:04:13.904961 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 16:04:13.905054 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 16:04:13.905138 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 16:04:13.905222 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 16:04:13.905311 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 16:04:13.905401 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 16:04:13.905484 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 16:04:13.905571 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 16:04:13.905659 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 16:04:13.905750 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 16:04:13.905830 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 16:04:13.905906 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 16:04:13.905986 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 16:04:13.910129 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 16:04:13.910234 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 16:04:13.910326 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 16:04:13.910423 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 16:04:13.910511 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 16:04:13.910602 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 16:04:13.910687 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 16:04:13.910776 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 16:04:13.910862 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 16:04:13.910946 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 16:04:13.911031 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 16:04:13.913163 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 16:04:13.913244 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 16:04:13.913319 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 16:04:13.913422 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 16:04:13.913497 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 16:04:13.913575 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 16:04:13.913649 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 16:04:13.913737 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 16:04:13.913820 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 16:04:13.913899 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 16:04:13.913985 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 16:04:13.914083 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 16:04:13.914164 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 16:04:13.914242 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 16:04:13.914332 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 16:04:13.914417 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 16:04:13.914496 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 16:04:13.914579 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 16:04:13.914658 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 16:04:13.914736 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 16:04:13.914821 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 16:04:13.914903 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 16:04:13.914981 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 16:04:13.915112 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 16:04:13.915197 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 16:04:13.915277 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 16:04:13.915369 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 16:04:13.915449 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 16:04:13.915541 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 16:04:13.915618 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 16:04:13.915690 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 16:04:13.915760 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 16:04:13.915772 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 16:04:13.915782 kernel: PCI: CLS 0 bytes, default 64 Dec 13 16:04:13.915791 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 16:04:13.915800 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 16:04:13.915812 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 16:04:13.915822 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Dec 13 16:04:13.915830 kernel: Initialise system trusted keyrings Dec 13 16:04:13.915839 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 16:04:13.915848 kernel: Key type asymmetric registered Dec 13 16:04:13.915857 kernel: Asymmetric key parser 'x509' registered Dec 13 16:04:13.915866 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 16:04:13.915875 kernel: io scheduler mq-deadline registered Dec 13 16:04:13.915884 kernel: io scheduler kyber registered Dec 13 16:04:13.915895 kernel: io scheduler bfq registered Dec 13 16:04:13.915973 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 16:04:13.916094 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 16:04:13.916174 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.916252 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 16:04:13.916333 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 16:04:13.916410 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.916490 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 16:04:13.916565 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 16:04:13.916641 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.916717 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 16:04:13.916793 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 16:04:13.916868 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.916948 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 16:04:13.917024 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 16:04:13.917107 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.917202 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 16:04:13.917285 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 16:04:13.917375 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.917472 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 16:04:13.917548 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 16:04:13.917623 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.917700 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 16:04:13.917776 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 16:04:13.917855 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 16:04:13.917869 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 16:04:13.917879 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 16:04:13.917888 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 16:04:13.917897 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 16:04:13.917907 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 16:04:13.917916 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 16:04:13.917925 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 16:04:13.917934 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 16:04:13.917945 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 16:04:13.918029 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 16:04:13.918131 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 16:04:13.918208 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T16:04:13 UTC (1734105853) Dec 13 16:04:13.918286 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 16:04:13.918298 kernel: intel_pstate: CPU model not supported Dec 13 16:04:13.918308 kernel: NET: Registered PF_INET6 protocol family Dec 13 16:04:13.918321 kernel: Segment Routing with IPv6 Dec 13 16:04:13.918337 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 16:04:13.918347 kernel: NET: Registered PF_PACKET protocol family Dec 13 16:04:13.918357 kernel: Key type dns_resolver registered Dec 13 16:04:13.918367 kernel: IPI shorthand broadcast: enabled Dec 13 16:04:13.918377 kernel: sched_clock: Marking stable (757643946, 118261016)->(1086547433, -210642471) Dec 13 16:04:13.918386 kernel: registered taskstats version 1 Dec 13 16:04:13.918396 kernel: Loading compiled-in X.509 certificates Dec 13 16:04:13.918406 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 16:04:13.918418 kernel: Key type .fscrypt registered Dec 13 16:04:13.918428 kernel: Key type fscrypt-provisioning registered Dec 13 16:04:13.918439 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 16:04:13.918448 kernel: ima: Allocated hash algorithm: sha1 Dec 13 16:04:13.918458 kernel: ima: No architecture policies found Dec 13 16:04:13.918468 kernel: clk: Disabling unused clocks Dec 13 16:04:13.918478 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 16:04:13.918488 kernel: Write protecting the kernel read-only data: 28672k Dec 13 16:04:13.918498 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 16:04:13.918511 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 16:04:13.918520 kernel: Run /init as init process Dec 13 16:04:13.918530 kernel: with arguments: Dec 13 16:04:13.918540 kernel: /init Dec 13 16:04:13.918549 kernel: with environment: Dec 13 16:04:13.918559 kernel: HOME=/ Dec 13 16:04:13.918568 kernel: TERM=linux Dec 13 16:04:13.918578 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 16:04:13.918590 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 16:04:13.918605 systemd[1]: Detected virtualization kvm. Dec 13 16:04:13.918616 systemd[1]: Detected architecture x86-64. Dec 13 16:04:13.918626 systemd[1]: Running in initrd. Dec 13 16:04:13.918635 systemd[1]: No hostname configured, using default hostname. Dec 13 16:04:13.918645 systemd[1]: Hostname set to . Dec 13 16:04:13.918655 systemd[1]: Initializing machine ID from VM UUID. Dec 13 16:04:13.918665 systemd[1]: Queued start job for default target initrd.target. Dec 13 16:04:13.918677 systemd[1]: Started systemd-ask-password-console.path. Dec 13 16:04:13.918687 systemd[1]: Reached target cryptsetup.target. Dec 13 16:04:13.918698 systemd[1]: Reached target paths.target. Dec 13 16:04:13.918707 systemd[1]: Reached target slices.target. Dec 13 16:04:13.918717 systemd[1]: Reached target swap.target. Dec 13 16:04:13.918727 systemd[1]: Reached target timers.target. Dec 13 16:04:13.918738 systemd[1]: Listening on iscsid.socket. Dec 13 16:04:13.918748 systemd[1]: Listening on iscsiuio.socket. Dec 13 16:04:13.918761 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 16:04:13.918773 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 16:04:13.918783 systemd[1]: Listening on systemd-journald.socket. Dec 13 16:04:13.918794 systemd[1]: Listening on systemd-networkd.socket. Dec 13 16:04:13.918803 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 16:04:13.918814 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 16:04:13.918824 systemd[1]: Reached target sockets.target. Dec 13 16:04:13.918834 systemd[1]: Starting kmod-static-nodes.service... Dec 13 16:04:13.918845 systemd[1]: Finished network-cleanup.service. Dec 13 16:04:13.918857 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 16:04:13.918867 systemd[1]: Starting systemd-journald.service... Dec 13 16:04:13.918877 systemd[1]: Starting systemd-modules-load.service... Dec 13 16:04:13.918887 systemd[1]: Starting systemd-resolved.service... Dec 13 16:04:13.918897 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 16:04:13.918908 systemd[1]: Finished kmod-static-nodes.service. Dec 13 16:04:13.918918 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 16:04:13.918933 systemd-journald[200]: Journal started Dec 13 16:04:13.918987 systemd-journald[200]: Runtime Journal (/run/log/journal/d28ac7987e464a10b2d01fa0795b28bd) is 4.7M, max 38.1M, 33.3M free. Dec 13 16:04:13.885165 systemd-modules-load[201]: Inserted module 'overlay' Dec 13 16:04:13.945964 systemd[1]: Started systemd-resolved.service. Dec 13 16:04:13.945995 systemd[1]: Started systemd-journald.service. Dec 13 16:04:13.946010 kernel: audit: type=1130 audit(1734105853.927:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.946025 kernel: audit: type=1130 audit(1734105853.928:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.946044 kernel: audit: type=1130 audit(1734105853.929:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.946065 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 16:04:13.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.907622 systemd-resolved[202]: Positive Trust Anchors: Dec 13 16:04:13.907636 systemd-resolved[202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 16:04:13.907670 systemd-resolved[202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 16:04:13.952083 kernel: audit: type=1130 audit(1734105853.947:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.952100 kernel: Bridge firewalling registered Dec 13 16:04:13.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.911790 systemd-resolved[202]: Defaulting to hostname 'linux'. Dec 13 16:04:13.930074 systemd[1]: Reached target nss-lookup.target. Dec 13 16:04:13.956031 kernel: audit: type=1130 audit(1734105853.952:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.931132 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 16:04:13.947063 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 16:04:13.947858 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 16:04:13.948661 systemd-modules-load[201]: Inserted module 'br_netfilter' Dec 13 16:04:13.953162 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 16:04:13.974479 kernel: audit: type=1130 audit(1734105853.970:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:13.970221 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 16:04:13.971320 systemd[1]: Starting dracut-cmdline.service... Dec 13 16:04:13.976376 kernel: SCSI subsystem initialized Dec 13 16:04:13.983644 dracut-cmdline[217]: dracut-dracut-053 Dec 13 16:04:13.987159 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 16:04:14.001109 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 16:04:14.001132 kernel: device-mapper: uevent: version 1.0.3 Dec 13 16:04:14.001144 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 16:04:14.000199 systemd-modules-load[201]: Inserted module 'dm_multipath' Dec 13 16:04:14.000838 systemd[1]: Finished systemd-modules-load.service. Dec 13 16:04:14.001921 systemd[1]: Starting systemd-sysctl.service... Dec 13 16:04:14.006649 kernel: audit: type=1130 audit(1734105854.001:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.014286 systemd[1]: Finished systemd-sysctl.service. Dec 13 16:04:14.018261 kernel: audit: type=1130 audit(1734105854.014:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.098110 kernel: Loading iSCSI transport class v2.0-870. Dec 13 16:04:14.117085 kernel: iscsi: registered transport (tcp) Dec 13 16:04:14.141097 kernel: iscsi: registered transport (qla4xxx) Dec 13 16:04:14.141218 kernel: QLogic iSCSI HBA Driver Dec 13 16:04:14.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.194631 systemd[1]: Finished dracut-cmdline.service. Dec 13 16:04:14.199838 kernel: audit: type=1130 audit(1734105854.195:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.197384 systemd[1]: Starting dracut-pre-udev.service... Dec 13 16:04:14.264124 kernel: raid6: avx512x4 gen() 17393 MB/s Dec 13 16:04:14.281184 kernel: raid6: avx512x4 xor() 8082 MB/s Dec 13 16:04:14.298104 kernel: raid6: avx512x2 gen() 17428 MB/s Dec 13 16:04:14.315113 kernel: raid6: avx512x2 xor() 21790 MB/s Dec 13 16:04:14.332130 kernel: raid6: avx512x1 gen() 17519 MB/s Dec 13 16:04:14.349106 kernel: raid6: avx512x1 xor() 20086 MB/s Dec 13 16:04:14.366119 kernel: raid6: avx2x4 gen() 17406 MB/s Dec 13 16:04:14.383099 kernel: raid6: avx2x4 xor() 7174 MB/s Dec 13 16:04:14.400174 kernel: raid6: avx2x2 gen() 17436 MB/s Dec 13 16:04:14.417114 kernel: raid6: avx2x2 xor() 15894 MB/s Dec 13 16:04:14.434098 kernel: raid6: avx2x1 gen() 13294 MB/s Dec 13 16:04:14.451105 kernel: raid6: avx2x1 xor() 13784 MB/s Dec 13 16:04:14.468086 kernel: raid6: sse2x4 gen() 8367 MB/s Dec 13 16:04:14.485096 kernel: raid6: sse2x4 xor() 5427 MB/s Dec 13 16:04:14.502097 kernel: raid6: sse2x2 gen() 9396 MB/s Dec 13 16:04:14.519103 kernel: raid6: sse2x2 xor() 5391 MB/s Dec 13 16:04:14.536097 kernel: raid6: sse2x1 gen() 8794 MB/s Dec 13 16:04:14.553612 kernel: raid6: sse2x1 xor() 4419 MB/s Dec 13 16:04:14.553675 kernel: raid6: using algorithm avx512x1 gen() 17519 MB/s Dec 13 16:04:14.553710 kernel: raid6: .... xor() 20086 MB/s, rmw enabled Dec 13 16:04:14.554364 kernel: raid6: using avx512x2 recovery algorithm Dec 13 16:04:14.568097 kernel: xor: automatically using best checksumming function avx Dec 13 16:04:14.668526 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 16:04:14.681732 systemd[1]: Finished dracut-pre-udev.service. Dec 13 16:04:14.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.682000 audit: BPF prog-id=7 op=LOAD Dec 13 16:04:14.682000 audit: BPF prog-id=8 op=LOAD Dec 13 16:04:14.683366 systemd[1]: Starting systemd-udevd.service... Dec 13 16:04:14.696467 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 16:04:14.701360 systemd[1]: Started systemd-udevd.service. Dec 13 16:04:14.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.705225 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 16:04:14.718571 dracut-pre-trigger[416]: rd.md=0: removing MD RAID activation Dec 13 16:04:14.748501 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 16:04:14.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.749665 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 16:04:14.799813 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 16:04:14.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:14.864079 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 16:04:14.876555 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 16:04:14.876579 kernel: GPT:17805311 != 125829119 Dec 13 16:04:14.876592 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 16:04:14.876604 kernel: GPT:17805311 != 125829119 Dec 13 16:04:14.876615 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 16:04:14.876626 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 16:04:14.876639 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 16:04:14.880065 kernel: libata version 3.00 loaded. Dec 13 16:04:14.890285 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 16:04:14.956652 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 16:04:14.956681 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 16:04:14.956795 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 16:04:14.956889 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (455) Dec 13 16:04:14.956903 kernel: scsi host0: ahci Dec 13 16:04:14.957016 kernel: scsi host1: ahci Dec 13 16:04:14.957131 kernel: scsi host2: ahci Dec 13 16:04:14.957237 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 16:04:14.957254 kernel: AES CTR mode by8 optimization enabled Dec 13 16:04:14.957266 kernel: scsi host3: ahci Dec 13 16:04:14.957364 kernel: scsi host4: ahci Dec 13 16:04:14.957468 kernel: ACPI: bus type USB registered Dec 13 16:04:14.957481 kernel: usbcore: registered new interface driver usbfs Dec 13 16:04:14.957493 kernel: usbcore: registered new interface driver hub Dec 13 16:04:14.957505 kernel: usbcore: registered new device driver usb Dec 13 16:04:14.957517 kernel: scsi host5: ahci Dec 13 16:04:14.957620 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 35 Dec 13 16:04:14.957633 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 35 Dec 13 16:04:14.957645 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 35 Dec 13 16:04:14.957656 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 35 Dec 13 16:04:14.957668 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 35 Dec 13 16:04:14.957680 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 35 Dec 13 16:04:14.915058 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 16:04:14.920729 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 16:04:14.981412 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 16:04:14.988386 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 16:04:14.992187 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 16:04:14.994316 systemd[1]: Starting disk-uuid.service... Dec 13 16:04:14.999868 disk-uuid[499]: Primary Header is updated. Dec 13 16:04:14.999868 disk-uuid[499]: Secondary Entries is updated. Dec 13 16:04:14.999868 disk-uuid[499]: Secondary Header is updated. Dec 13 16:04:15.004067 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 16:04:15.008060 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 16:04:15.271226 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.271382 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.280099 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.280250 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.285071 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.295157 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 16:04:15.314787 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 16:04:15.324976 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 16:04:15.325122 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 16:04:15.325236 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 16:04:15.325335 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 16:04:15.325429 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 16:04:15.325525 kernel: hub 1-0:1.0: USB hub found Dec 13 16:04:15.325676 kernel: hub 1-0:1.0: 4 ports detected Dec 13 16:04:15.325780 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 16:04:15.325891 kernel: hub 2-0:1.0: USB hub found Dec 13 16:04:15.326022 kernel: hub 2-0:1.0: 4 ports detected Dec 13 16:04:15.567077 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 16:04:15.710075 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 16:04:15.715554 kernel: usbcore: registered new interface driver usbhid Dec 13 16:04:15.715618 kernel: usbhid: USB HID core driver Dec 13 16:04:15.721510 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 16:04:15.721568 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 16:04:16.014467 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 16:04:16.015900 disk-uuid[505]: The operation has completed successfully. Dec 13 16:04:16.058226 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 16:04:16.058870 systemd[1]: Finished disk-uuid.service. Dec 13 16:04:16.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.060470 systemd[1]: Starting verity-setup.service... Dec 13 16:04:16.077070 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 16:04:16.118744 systemd[1]: Found device dev-mapper-usr.device. Dec 13 16:04:16.120591 systemd[1]: Mounting sysusr-usr.mount... Dec 13 16:04:16.122641 systemd[1]: Finished verity-setup.service. Dec 13 16:04:16.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.209058 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 16:04:16.209527 systemd[1]: Mounted sysusr-usr.mount. Dec 13 16:04:16.210465 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 16:04:16.211724 systemd[1]: Starting ignition-setup.service... Dec 13 16:04:16.220191 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 16:04:16.230450 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 16:04:16.230496 kernel: BTRFS info (device vda6): using free space tree Dec 13 16:04:16.230510 kernel: BTRFS info (device vda6): has skinny extents Dec 13 16:04:16.261271 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 16:04:16.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.269306 systemd[1]: Finished ignition-setup.service. Dec 13 16:04:16.270722 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 16:04:16.355966 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 16:04:16.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.357000 audit: BPF prog-id=9 op=LOAD Dec 13 16:04:16.357923 systemd[1]: Starting systemd-networkd.service... Dec 13 16:04:16.379794 ignition[650]: Ignition 2.14.0 Dec 13 16:04:16.379805 ignition[650]: Stage: fetch-offline Dec 13 16:04:16.379866 ignition[650]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:16.379891 ignition[650]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:16.380870 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:16.380963 ignition[650]: parsed url from cmdline: "" Dec 13 16:04:16.380967 ignition[650]: no config URL provided Dec 13 16:04:16.380972 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 16:04:16.380979 ignition[650]: no config at "/usr/lib/ignition/user.ign" Dec 13 16:04:16.380988 ignition[650]: failed to fetch config: resource requires networking Dec 13 16:04:16.381142 ignition[650]: Ignition finished successfully Dec 13 16:04:16.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.385279 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 16:04:16.390603 systemd-networkd[714]: lo: Link UP Dec 13 16:04:16.390614 systemd-networkd[714]: lo: Gained carrier Dec 13 16:04:16.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.391333 systemd-networkd[714]: Enumeration completed Dec 13 16:04:16.391404 systemd[1]: Started systemd-networkd.service. Dec 13 16:04:16.391692 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 16:04:16.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.391846 systemd[1]: Reached target network.target. Dec 13 16:04:16.393233 systemd-networkd[714]: eth0: Link UP Dec 13 16:04:16.393237 systemd-networkd[714]: eth0: Gained carrier Dec 13 16:04:16.393517 systemd[1]: Starting ignition-fetch.service... Dec 13 16:04:16.409934 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 16:04:16.409934 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 16:04:16.409934 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 16:04:16.409934 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 16:04:16.409934 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 16:04:16.409934 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 16:04:16.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.408624 ignition[716]: Ignition 2.14.0 Dec 13 16:04:16.394750 systemd[1]: Starting iscsiuio.service... Dec 13 16:04:16.408631 ignition[716]: Stage: fetch Dec 13 16:04:16.404402 systemd[1]: Started iscsiuio.service. Dec 13 16:04:16.408769 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:16.405645 systemd[1]: Starting iscsid.service... Dec 13 16:04:16.408786 ignition[716]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:16.411735 systemd[1]: Started iscsid.service. Dec 13 16:04:16.411507 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:16.413897 systemd[1]: Starting dracut-initqueue.service... Dec 13 16:04:16.411603 ignition[716]: parsed url from cmdline: "" Dec 13 16:04:16.411606 ignition[716]: no config URL provided Dec 13 16:04:16.411612 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 16:04:16.411619 ignition[716]: no config at "/usr/lib/ignition/user.ign" Dec 13 16:04:16.420635 ignition[716]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 16:04:16.420655 ignition[716]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 16:04:16.420660 ignition[716]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 16:04:16.423205 ignition[716]: GET error: Get "http://169.254.169.254/openstack/latest/user_data": dial tcp 169.254.169.254:80: connect: network is unreachable Dec 13 16:04:16.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.428070 systemd[1]: Finished dracut-initqueue.service. Dec 13 16:04:16.428526 systemd[1]: Reached target remote-fs-pre.target. Dec 13 16:04:16.428863 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 16:04:16.429247 systemd[1]: Reached target remote-fs.target. Dec 13 16:04:16.430648 systemd[1]: Starting dracut-pre-mount.service... Dec 13 16:04:16.440101 systemd[1]: Finished dracut-pre-mount.service. Dec 13 16:04:16.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.441148 systemd-networkd[714]: eth0: DHCPv4 address 10.244.95.154/30, gateway 10.244.95.153 acquired from 10.244.95.153 Dec 13 16:04:16.623720 ignition[716]: GET http://169.254.169.254/openstack/latest/user_data: attempt #2 Dec 13 16:04:16.644131 ignition[716]: GET result: OK Dec 13 16:04:16.644446 ignition[716]: parsing config with SHA512: 1fc6e894edd7fdd28af3dccad7b94e84cca93bc035d0ede6c9addfa4ebe50cdad155e89a7157d85bc9321ceed95bbac075ccd93d0c920f51c8a01c6d96c124ad Dec 13 16:04:16.659877 unknown[716]: fetched base config from "system" Dec 13 16:04:16.659896 unknown[716]: fetched base config from "system" Dec 13 16:04:16.660425 ignition[716]: fetch: fetch complete Dec 13 16:04:16.659903 unknown[716]: fetched user config from "openstack" Dec 13 16:04:16.660431 ignition[716]: fetch: fetch passed Dec 13 16:04:16.660478 ignition[716]: Ignition finished successfully Dec 13 16:04:16.665288 systemd[1]: Finished ignition-fetch.service. Dec 13 16:04:16.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.666835 systemd[1]: Starting ignition-kargs.service... Dec 13 16:04:16.679027 ignition[739]: Ignition 2.14.0 Dec 13 16:04:16.679699 ignition[739]: Stage: kargs Dec 13 16:04:16.680228 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:16.680774 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:16.681914 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:16.683744 ignition[739]: kargs: kargs passed Dec 13 16:04:16.684238 ignition[739]: Ignition finished successfully Dec 13 16:04:16.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.685580 systemd[1]: Finished ignition-kargs.service. Dec 13 16:04:16.687792 systemd[1]: Starting ignition-disks.service... Dec 13 16:04:16.697405 ignition[745]: Ignition 2.14.0 Dec 13 16:04:16.697418 ignition[745]: Stage: disks Dec 13 16:04:16.697562 ignition[745]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:16.697585 ignition[745]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:16.698775 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:16.699939 ignition[745]: disks: disks passed Dec 13 16:04:16.699986 ignition[745]: Ignition finished successfully Dec 13 16:04:16.701189 systemd[1]: Finished ignition-disks.service. Dec 13 16:04:16.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.702153 systemd[1]: Reached target initrd-root-device.target. Dec 13 16:04:16.702679 systemd[1]: Reached target local-fs-pre.target. Dec 13 16:04:16.703391 systemd[1]: Reached target local-fs.target. Dec 13 16:04:16.704028 systemd[1]: Reached target sysinit.target. Dec 13 16:04:16.704658 systemd[1]: Reached target basic.target. Dec 13 16:04:16.706453 systemd[1]: Starting systemd-fsck-root.service... Dec 13 16:04:16.721090 systemd-fsck[752]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 16:04:16.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.725788 systemd[1]: Finished systemd-fsck-root.service. Dec 13 16:04:16.727156 systemd[1]: Mounting sysroot.mount... Dec 13 16:04:16.735125 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 16:04:16.736520 systemd[1]: Mounted sysroot.mount. Dec 13 16:04:16.736977 systemd[1]: Reached target initrd-root-fs.target. Dec 13 16:04:16.740451 systemd[1]: Mounting sysroot-usr.mount... Dec 13 16:04:16.742716 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 16:04:16.744523 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 16:04:16.746123 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 16:04:16.746228 systemd[1]: Reached target ignition-diskful.target. Dec 13 16:04:16.750225 systemd[1]: Mounted sysroot-usr.mount. Dec 13 16:04:16.755161 systemd[1]: Starting initrd-setup-root.service... Dec 13 16:04:16.767388 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 16:04:16.777112 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory Dec 13 16:04:16.783969 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 16:04:16.793645 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 16:04:16.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.845427 systemd[1]: Finished initrd-setup-root.service. Dec 13 16:04:16.846924 systemd[1]: Starting ignition-mount.service... Dec 13 16:04:16.849171 systemd[1]: Starting sysroot-boot.service... Dec 13 16:04:16.861483 bash[807]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 16:04:16.872878 coreos-metadata[758]: Dec 13 16:04:16.872 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 16:04:16.877630 ignition[808]: INFO : Ignition 2.14.0 Dec 13 16:04:16.877630 ignition[808]: INFO : Stage: mount Dec 13 16:04:16.878592 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:16.878592 ignition[808]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:16.879763 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:16.880314 ignition[808]: INFO : mount: mount passed Dec 13 16:04:16.880314 ignition[808]: INFO : Ignition finished successfully Dec 13 16:04:16.881258 systemd[1]: Finished ignition-mount.service. Dec 13 16:04:16.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.884947 systemd[1]: Finished sysroot-boot.service. Dec 13 16:04:16.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.897501 coreos-metadata[758]: Dec 13 16:04:16.897 INFO Fetch successful Dec 13 16:04:16.898266 coreos-metadata[758]: Dec 13 16:04:16.897 INFO wrote hostname srv-3qt9m.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 16:04:16.901013 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 16:04:16.901182 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 16:04:16.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:16.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:17.141316 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 16:04:17.155077 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (815) Dec 13 16:04:17.157913 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 16:04:17.157978 kernel: BTRFS info (device vda6): using free space tree Dec 13 16:04:17.158050 kernel: BTRFS info (device vda6): has skinny extents Dec 13 16:04:17.165530 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 16:04:17.169255 systemd[1]: Starting ignition-files.service... Dec 13 16:04:17.193233 ignition[835]: INFO : Ignition 2.14.0 Dec 13 16:04:17.193233 ignition[835]: INFO : Stage: files Dec 13 16:04:17.195795 ignition[835]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:17.195795 ignition[835]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:17.195795 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:17.200975 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Dec 13 16:04:17.200975 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 16:04:17.200975 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 16:04:17.200975 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 16:04:17.200975 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 16:04:17.205657 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 16:04:17.205657 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 16:04:17.205657 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 16:04:17.202352 unknown[835]: wrote ssh authorized keys file for user: core Dec 13 16:04:17.436964 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 16:04:17.781716 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 16:04:17.783588 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 16:04:17.785321 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 16:04:17.786632 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 16:04:17.786632 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 16:04:17.786632 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 16:04:17.789508 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 16:04:18.365328 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 16:04:18.419384 systemd-networkd[714]: eth0: Gained IPv6LL Dec 13 16:04:19.929224 systemd-networkd[714]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17e6:24:19ff:fef4:5f9a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17e6:24:19ff:fef4:5f9a/64 assigned by NDisc. Dec 13 16:04:19.929234 systemd-networkd[714]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 16:04:20.431161 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 16:04:20.453941 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 16:04:20.466254 ignition[835]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 16:04:20.466254 ignition[835]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 16:04:20.466254 ignition[835]: INFO : files: files passed Dec 13 16:04:20.466254 ignition[835]: INFO : Ignition finished successfully Dec 13 16:04:20.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.469798 systemd[1]: Finished ignition-files.service. Dec 13 16:04:20.474957 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 16:04:20.474996 kernel: audit: type=1130 audit(1734105860.471:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.474755 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 16:04:20.475328 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 16:04:20.476257 systemd[1]: Starting ignition-quench.service... Dec 13 16:04:20.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.488332 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 16:04:20.494775 kernel: audit: type=1130 audit(1734105860.488:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.494804 kernel: audit: type=1131 audit(1734105860.488:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.488412 systemd[1]: Finished ignition-quench.service. Dec 13 16:04:20.495666 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 16:04:20.496158 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 16:04:20.502302 kernel: audit: type=1130 audit(1734105860.498:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.498184 systemd[1]: Reached target ignition-complete.target. Dec 13 16:04:20.501865 systemd[1]: Starting initrd-parse-etc.service... Dec 13 16:04:20.522374 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 16:04:20.522951 systemd[1]: Finished initrd-parse-etc.service. Dec 13 16:04:20.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.525194 systemd[1]: Reached target initrd-fs.target. Dec 13 16:04:20.530620 kernel: audit: type=1130 audit(1734105860.523:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.530677 kernel: audit: type=1131 audit(1734105860.525:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.529603 systemd[1]: Reached target initrd.target. Dec 13 16:04:20.530882 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 16:04:20.531637 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 16:04:20.545567 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 16:04:20.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.547074 systemd[1]: Starting initrd-cleanup.service... Dec 13 16:04:20.551126 kernel: audit: type=1130 audit(1734105860.546:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.557350 systemd[1]: Stopped target nss-lookup.target. Dec 13 16:04:20.557793 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 16:04:20.558445 systemd[1]: Stopped target timers.target. Dec 13 16:04:20.559023 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 16:04:20.562140 kernel: audit: type=1131 audit(1734105860.559:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.559123 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 16:04:20.559682 systemd[1]: Stopped target initrd.target. Dec 13 16:04:20.562522 systemd[1]: Stopped target basic.target. Dec 13 16:04:20.563091 systemd[1]: Stopped target ignition-complete.target. Dec 13 16:04:20.563663 systemd[1]: Stopped target ignition-diskful.target. Dec 13 16:04:20.564301 systemd[1]: Stopped target initrd-root-device.target. Dec 13 16:04:20.564963 systemd[1]: Stopped target remote-fs.target. Dec 13 16:04:20.565607 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 16:04:20.566296 systemd[1]: Stopped target sysinit.target. Dec 13 16:04:20.566908 systemd[1]: Stopped target local-fs.target. Dec 13 16:04:20.567498 systemd[1]: Stopped target local-fs-pre.target. Dec 13 16:04:20.568072 systemd[1]: Stopped target swap.target. Dec 13 16:04:20.572131 kernel: audit: type=1131 audit(1734105860.569:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.568607 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 16:04:20.568728 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 16:04:20.575775 kernel: audit: type=1131 audit(1734105860.573:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.569419 systemd[1]: Stopped target cryptsetup.target. Dec 13 16:04:20.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.572476 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 16:04:20.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.572587 systemd[1]: Stopped dracut-initqueue.service. Dec 13 16:04:20.573284 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 16:04:20.573405 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 16:04:20.576187 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 16:04:20.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.594489 iscsid[724]: iscsid shutting down. Dec 13 16:04:20.576291 systemd[1]: Stopped ignition-files.service. Dec 13 16:04:20.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.579549 systemd[1]: Stopping ignition-mount.service... Dec 13 16:04:20.581785 systemd[1]: Stopping iscsid.service... Dec 13 16:04:20.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.582936 systemd[1]: Stopping sysroot-boot.service... Dec 13 16:04:20.586222 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 16:04:20.586383 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 16:04:20.586875 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 16:04:20.586967 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 16:04:20.588785 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 16:04:20.590920 systemd[1]: Stopped iscsid.service. Dec 13 16:04:20.602808 ignition[873]: INFO : Ignition 2.14.0 Dec 13 16:04:20.602808 ignition[873]: INFO : Stage: umount Dec 13 16:04:20.602808 ignition[873]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 16:04:20.602808 ignition[873]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 16:04:20.594963 systemd[1]: Stopping iscsiuio.service... Dec 13 16:04:20.605270 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 16:04:20.605270 ignition[873]: INFO : umount: umount passed Dec 13 16:04:20.605270 ignition[873]: INFO : Ignition finished successfully Dec 13 16:04:20.595727 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 16:04:20.596094 systemd[1]: Stopped iscsiuio.service. Dec 13 16:04:20.596983 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 16:04:20.597569 systemd[1]: Finished initrd-cleanup.service. Dec 13 16:04:20.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.607849 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 16:04:20.607944 systemd[1]: Stopped ignition-mount.service. Dec 13 16:04:20.609830 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 16:04:20.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.612265 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 16:04:20.612340 systemd[1]: Stopped ignition-disks.service. Dec 13 16:04:20.612773 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 16:04:20.612816 systemd[1]: Stopped ignition-kargs.service. Dec 13 16:04:20.613210 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 16:04:20.613242 systemd[1]: Stopped ignition-fetch.service. Dec 13 16:04:20.613581 systemd[1]: Stopped target network.target. Dec 13 16:04:20.613887 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 16:04:20.613924 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 16:04:20.614280 systemd[1]: Stopped target paths.target. Dec 13 16:04:20.614575 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 16:04:20.618202 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 16:04:20.619726 systemd[1]: Stopped target slices.target. Dec 13 16:04:20.621360 systemd[1]: Stopped target sockets.target. Dec 13 16:04:20.622743 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 16:04:20.622849 systemd[1]: Closed iscsid.socket. Dec 13 16:04:20.624185 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 16:04:20.624267 systemd[1]: Closed iscsiuio.socket. Dec 13 16:04:20.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.625284 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 16:04:20.625385 systemd[1]: Stopped ignition-setup.service. Dec 13 16:04:20.626936 systemd[1]: Stopping systemd-networkd.service... Dec 13 16:04:20.628367 systemd[1]: Stopping systemd-resolved.service... Dec 13 16:04:20.630603 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 16:04:20.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.630827 systemd[1]: Stopped sysroot-boot.service. Dec 13 16:04:20.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.632177 systemd-networkd[714]: eth0: DHCPv6 lease lost Dec 13 16:04:20.632353 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 16:04:20.632454 systemd[1]: Stopped initrd-setup-root.service. Dec 13 16:04:20.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.635504 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 16:04:20.635740 systemd[1]: Stopped systemd-networkd.service. Dec 13 16:04:20.638000 audit: BPF prog-id=9 op=UNLOAD Dec 13 16:04:20.637989 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 16:04:20.638223 systemd[1]: Closed systemd-networkd.socket. Dec 13 16:04:20.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.641538 systemd[1]: Stopping network-cleanup.service... Dec 13 16:04:20.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.642133 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 16:04:20.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.642200 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 16:04:20.642812 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 16:04:20.642864 systemd[1]: Stopped systemd-sysctl.service. Dec 13 16:04:20.643697 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 16:04:20.643755 systemd[1]: Stopped systemd-modules-load.service. Dec 13 16:04:20.648126 systemd[1]: Stopping systemd-udevd.service... Dec 13 16:04:20.659570 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 16:04:20.660833 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 16:04:20.660948 systemd[1]: Stopped systemd-resolved.service. Dec 13 16:04:20.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.664000 audit: BPF prog-id=6 op=UNLOAD Dec 13 16:04:20.665198 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 16:04:20.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.665315 systemd[1]: Stopped network-cleanup.service. Dec 13 16:04:20.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.666020 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 16:04:20.666202 systemd[1]: Stopped systemd-udevd.service. Dec 13 16:04:20.667192 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 16:04:20.667235 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 16:04:20.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.668006 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 16:04:20.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.668097 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 16:04:20.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.668831 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 16:04:20.668876 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 16:04:20.669655 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 16:04:20.669714 systemd[1]: Stopped dracut-cmdline.service. Dec 13 16:04:20.670401 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 16:04:20.670440 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 16:04:20.671734 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 16:04:20.672185 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 16:04:20.672235 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 16:04:20.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.679303 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 16:04:20.679347 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 16:04:20.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.680107 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 16:04:20.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.680142 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 16:04:20.681559 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 16:04:20.681958 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 16:04:20.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.682023 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 16:04:20.682698 systemd[1]: Reached target initrd-switch-root.target. Dec 13 16:04:20.683908 systemd[1]: Starting initrd-switch-root.service... Dec 13 16:04:20.696477 systemd[1]: Switching root. Dec 13 16:04:20.711830 systemd-journald[200]: Journal stopped Dec 13 16:04:23.740293 systemd-journald[200]: Received SIGTERM from PID 1 (n/a). Dec 13 16:04:23.740397 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 16:04:23.740425 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 16:04:23.740441 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 16:04:23.740455 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 16:04:23.740469 kernel: SELinux: policy capability open_perms=1 Dec 13 16:04:23.740482 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 16:04:23.740496 kernel: SELinux: policy capability always_check_network=0 Dec 13 16:04:23.740509 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 16:04:23.740522 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 16:04:23.740539 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 16:04:23.740557 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 16:04:23.740574 systemd[1]: Successfully loaded SELinux policy in 57.566ms. Dec 13 16:04:23.740600 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.354ms. Dec 13 16:04:23.740621 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 16:04:23.740634 systemd[1]: Detected virtualization kvm. Dec 13 16:04:23.740650 systemd[1]: Detected architecture x86-64. Dec 13 16:04:23.740663 systemd[1]: Detected first boot. Dec 13 16:04:23.740677 systemd[1]: Hostname set to . Dec 13 16:04:23.740697 systemd[1]: Initializing machine ID from VM UUID. Dec 13 16:04:23.740711 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 16:04:23.740724 systemd[1]: Populated /etc with preset unit settings. Dec 13 16:04:23.740738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 16:04:23.740756 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 16:04:23.740771 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 16:04:23.740789 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 16:04:23.740805 systemd[1]: Stopped initrd-switch-root.service. Dec 13 16:04:23.740818 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 16:04:23.740832 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 16:04:23.740846 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 16:04:23.740861 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 16:04:23.740874 systemd[1]: Created slice system-getty.slice. Dec 13 16:04:23.740886 systemd[1]: Created slice system-modprobe.slice. Dec 13 16:04:23.740900 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 16:04:23.740920 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 16:04:23.740934 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 16:04:23.740948 systemd[1]: Created slice user.slice. Dec 13 16:04:23.740963 systemd[1]: Started systemd-ask-password-console.path. Dec 13 16:04:23.740976 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 16:04:23.740989 systemd[1]: Set up automount boot.automount. Dec 13 16:04:23.741003 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 16:04:23.741021 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 16:04:23.741034 systemd[1]: Stopped target initrd-fs.target. Dec 13 16:04:23.742185 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 16:04:23.742209 systemd[1]: Reached target integritysetup.target. Dec 13 16:04:23.742223 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 16:04:23.742238 systemd[1]: Reached target remote-fs.target. Dec 13 16:04:23.742252 systemd[1]: Reached target slices.target. Dec 13 16:04:23.742266 systemd[1]: Reached target swap.target. Dec 13 16:04:23.742286 systemd[1]: Reached target torcx.target. Dec 13 16:04:23.742306 systemd[1]: Reached target veritysetup.target. Dec 13 16:04:23.742321 systemd[1]: Listening on systemd-coredump.socket. Dec 13 16:04:23.742336 systemd[1]: Listening on systemd-initctl.socket. Dec 13 16:04:23.742351 systemd[1]: Listening on systemd-networkd.socket. Dec 13 16:04:23.742368 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 16:04:23.742381 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 16:04:23.742403 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 16:04:23.742418 systemd[1]: Mounting dev-hugepages.mount... Dec 13 16:04:23.742432 systemd[1]: Mounting dev-mqueue.mount... Dec 13 16:04:23.742449 systemd[1]: Mounting media.mount... Dec 13 16:04:23.742464 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:23.742478 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 16:04:23.742491 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 16:04:23.742504 systemd[1]: Mounting tmp.mount... Dec 13 16:04:23.742518 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 16:04:23.742534 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 16:04:23.742548 systemd[1]: Starting kmod-static-nodes.service... Dec 13 16:04:23.742562 systemd[1]: Starting modprobe@configfs.service... Dec 13 16:04:23.742580 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 16:04:23.742594 systemd[1]: Starting modprobe@drm.service... Dec 13 16:04:23.742608 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 16:04:23.742622 systemd[1]: Starting modprobe@fuse.service... Dec 13 16:04:23.742635 systemd[1]: Starting modprobe@loop.service... Dec 13 16:04:23.742649 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 16:04:23.742664 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 16:04:23.742677 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 16:04:23.742691 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 16:04:23.742710 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 16:04:23.742724 systemd[1]: Stopped systemd-journald.service. Dec 13 16:04:23.742736 systemd[1]: Starting systemd-journald.service... Dec 13 16:04:23.742750 systemd[1]: Starting systemd-modules-load.service... Dec 13 16:04:23.742763 systemd[1]: Starting systemd-network-generator.service... Dec 13 16:04:23.742777 systemd[1]: Starting systemd-remount-fs.service... Dec 13 16:04:23.742791 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 16:04:23.742805 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 16:04:23.742818 kernel: loop: module loaded Dec 13 16:04:23.742840 systemd[1]: Stopped verity-setup.service. Dec 13 16:04:23.742854 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:23.742868 systemd[1]: Mounted dev-hugepages.mount. Dec 13 16:04:23.742882 systemd[1]: Mounted dev-mqueue.mount. Dec 13 16:04:23.742895 systemd[1]: Mounted media.mount. Dec 13 16:04:23.742908 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 16:04:23.742922 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 16:04:23.742937 systemd[1]: Mounted tmp.mount. Dec 13 16:04:23.742950 systemd[1]: Finished kmod-static-nodes.service. Dec 13 16:04:23.742964 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 16:04:23.742983 systemd[1]: Finished modprobe@configfs.service. Dec 13 16:04:23.742996 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 16:04:23.743010 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 16:04:23.743028 systemd-journald[976]: Journal started Dec 13 16:04:23.749556 systemd-journald[976]: Runtime Journal (/run/log/journal/d28ac7987e464a10b2d01fa0795b28bd) is 4.7M, max 38.1M, 33.3M free. Dec 13 16:04:23.749604 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 16:04:23.749638 systemd[1]: Finished modprobe@drm.service. Dec 13 16:04:23.749657 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 16:04:23.749674 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 16:04:20.840000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 16:04:20.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 16:04:20.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 16:04:20.896000 audit: BPF prog-id=10 op=LOAD Dec 13 16:04:20.896000 audit: BPF prog-id=10 op=UNLOAD Dec 13 16:04:20.896000 audit: BPF prog-id=11 op=LOAD Dec 13 16:04:20.896000 audit: BPF prog-id=11 op=UNLOAD Dec 13 16:04:20.981000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 16:04:20.981000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:20.981000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 16:04:20.982000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 16:04:20.982000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:20.982000 audit: CWD cwd="/" Dec 13 16:04:20.982000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:20.982000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:20.982000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 16:04:23.575000 audit: BPF prog-id=12 op=LOAD Dec 13 16:04:23.575000 audit: BPF prog-id=3 op=UNLOAD Dec 13 16:04:23.575000 audit: BPF prog-id=13 op=LOAD Dec 13 16:04:23.575000 audit: BPF prog-id=14 op=LOAD Dec 13 16:04:23.575000 audit: BPF prog-id=4 op=UNLOAD Dec 13 16:04:23.575000 audit: BPF prog-id=5 op=UNLOAD Dec 13 16:04:23.576000 audit: BPF prog-id=15 op=LOAD Dec 13 16:04:23.576000 audit: BPF prog-id=12 op=UNLOAD Dec 13 16:04:23.576000 audit: BPF prog-id=16 op=LOAD Dec 13 16:04:23.576000 audit: BPF prog-id=17 op=LOAD Dec 13 16:04:23.576000 audit: BPF prog-id=13 op=UNLOAD Dec 13 16:04:23.576000 audit: BPF prog-id=14 op=UNLOAD Dec 13 16:04:23.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.585000 audit: BPF prog-id=15 op=UNLOAD Dec 13 16:04:23.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.750809 systemd[1]: Started systemd-journald.service. Dec 13 16:04:23.695000 audit: BPF prog-id=18 op=LOAD Dec 13 16:04:23.695000 audit: BPF prog-id=19 op=LOAD Dec 13 16:04:23.695000 audit: BPF prog-id=20 op=LOAD Dec 13 16:04:23.696000 audit: BPF prog-id=16 op=UNLOAD Dec 13 16:04:23.696000 audit: BPF prog-id=17 op=UNLOAD Dec 13 16:04:23.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.738000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 16:04:23.738000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff91832f90 a2=4000 a3=7fff9183302c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:23.738000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 16:04:23.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.572335 systemd[1]: Queued start job for default target multi-user.target. Dec 13 16:04:20.979120 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 16:04:23.572351 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 16:04:20.979540 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 16:04:23.576927 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 16:04:20.979565 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 16:04:20.979604 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 16:04:20.979616 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 16:04:20.979660 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 16:04:20.979675 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 16:04:20.979898 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 16:04:23.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:20.979944 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 16:04:20.979960 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 16:04:20.980567 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 16:04:20.980605 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 16:04:20.980626 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 16:04:20.980643 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 16:04:23.752863 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 16:04:20.980670 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 16:04:23.756397 kernel: fuse: init (API version 7.34) Dec 13 16:04:23.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.752984 systemd[1]: Finished modprobe@loop.service. Dec 13 16:04:20.980685 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 16:04:23.754128 systemd[1]: Finished systemd-modules-load.service. Dec 13 16:04:23.206706 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 16:04:23.754720 systemd[1]: Finished systemd-network-generator.service. Dec 13 16:04:23.207159 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 16:04:23.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.755405 systemd[1]: Finished systemd-remount-fs.service. Dec 13 16:04:23.207289 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 16:04:23.757575 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 16:04:23.207504 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 16:04:23.757689 systemd[1]: Finished modprobe@fuse.service. Dec 13 16:04:23.207565 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 16:04:23.207629 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T16:04:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 16:04:23.759586 systemd[1]: Reached target network-pre.target. Dec 13 16:04:23.761334 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 16:04:23.767634 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 16:04:23.767993 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 16:04:23.771134 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 16:04:23.772757 systemd[1]: Starting systemd-journal-flush.service... Dec 13 16:04:23.773265 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 16:04:23.774649 systemd[1]: Starting systemd-random-seed.service... Dec 13 16:04:23.775081 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 16:04:23.776250 systemd[1]: Starting systemd-sysctl.service... Dec 13 16:04:23.778690 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 16:04:23.781231 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 16:04:23.791252 systemd-journald[976]: Time spent on flushing to /var/log/journal/d28ac7987e464a10b2d01fa0795b28bd is 50.049ms for 1314 entries. Dec 13 16:04:23.791252 systemd-journald[976]: System Journal (/var/log/journal/d28ac7987e464a10b2d01fa0795b28bd) is 8.0M, max 584.8M, 576.8M free. Dec 13 16:04:23.849364 systemd-journald[976]: Received client request to flush runtime journal. Dec 13 16:04:23.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.798565 systemd[1]: Finished systemd-random-seed.service. Dec 13 16:04:23.799136 systemd[1]: Reached target first-boot-complete.target. Dec 13 16:04:23.808442 systemd[1]: Finished systemd-sysctl.service. Dec 13 16:04:23.834238 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 16:04:23.837987 systemd[1]: Starting systemd-sysusers.service... Dec 13 16:04:23.850262 systemd[1]: Finished systemd-journal-flush.service. Dec 13 16:04:23.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.865257 systemd[1]: Finished systemd-sysusers.service. Dec 13 16:04:23.866980 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 16:04:23.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.901210 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 16:04:23.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.902919 systemd[1]: Starting systemd-udev-settle.service... Dec 13 16:04:23.915071 udevadm[1018]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 16:04:23.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:23.928099 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 16:04:24.343890 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 16:04:24.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.346000 audit: BPF prog-id=21 op=LOAD Dec 13 16:04:24.346000 audit: BPF prog-id=22 op=LOAD Dec 13 16:04:24.346000 audit: BPF prog-id=7 op=UNLOAD Dec 13 16:04:24.346000 audit: BPF prog-id=8 op=UNLOAD Dec 13 16:04:24.347569 systemd[1]: Starting systemd-udevd.service... Dec 13 16:04:24.367651 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Dec 13 16:04:24.390641 systemd[1]: Started systemd-udevd.service. Dec 13 16:04:24.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.392000 audit: BPF prog-id=23 op=LOAD Dec 13 16:04:24.397541 systemd[1]: Starting systemd-networkd.service... Dec 13 16:04:24.406000 audit: BPF prog-id=24 op=LOAD Dec 13 16:04:24.406000 audit: BPF prog-id=25 op=LOAD Dec 13 16:04:24.407000 audit: BPF prog-id=26 op=LOAD Dec 13 16:04:24.407848 systemd[1]: Starting systemd-userdbd.service... Dec 13 16:04:24.448371 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 16:04:24.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.455833 systemd[1]: Started systemd-userdbd.service. Dec 13 16:04:24.525462 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 16:04:24.532075 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 16:04:24.540060 kernel: ACPI: button: Power Button [PWRF] Dec 13 16:04:24.543378 systemd-networkd[1034]: lo: Link UP Dec 13 16:04:24.543388 systemd-networkd[1034]: lo: Gained carrier Dec 13 16:04:24.543874 systemd-networkd[1034]: Enumeration completed Dec 13 16:04:24.543995 systemd[1]: Started systemd-networkd.service. Dec 13 16:04:24.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.544587 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 16:04:24.546062 systemd-networkd[1034]: eth0: Link UP Dec 13 16:04:24.546088 systemd-networkd[1034]: eth0: Gained carrier Dec 13 16:04:24.555376 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 16:04:24.561239 systemd-networkd[1034]: eth0: DHCPv4 address 10.244.95.154/30, gateway 10.244.95.153 acquired from 10.244.95.153 Dec 13 16:04:24.597000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 16:04:24.597000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556131d69ee0 a1=337fc a2=7fdd4803abc5 a3=5 items=110 ppid=1019 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:24.597000 audit: CWD cwd="/" Dec 13 16:04:24.597000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=1 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=2 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=3 name=(null) inode=14734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=4 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=5 name=(null) inode=14735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=6 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=7 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=8 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=9 name=(null) inode=14737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=10 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=11 name=(null) inode=14738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=12 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=13 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=14 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=15 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=16 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=17 name=(null) inode=14741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=18 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=19 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=20 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=21 name=(null) inode=14743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=22 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=23 name=(null) inode=14744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=24 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=25 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=26 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=27 name=(null) inode=14746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=28 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=29 name=(null) inode=14747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=30 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=31 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=32 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=33 name=(null) inode=14749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=34 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=35 name=(null) inode=14750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=36 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=37 name=(null) inode=14751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=38 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=39 name=(null) inode=14752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=40 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=41 name=(null) inode=14753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=42 name=(null) inode=14733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=43 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=44 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=45 name=(null) inode=14755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=46 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=47 name=(null) inode=14756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=48 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=49 name=(null) inode=14757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=50 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=51 name=(null) inode=14758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=52 name=(null) inode=14754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=53 name=(null) inode=14759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=55 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=56 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=57 name=(null) inode=14761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=58 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=59 name=(null) inode=14762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=60 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=61 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=62 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=63 name=(null) inode=14764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=64 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=65 name=(null) inode=14765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=66 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=67 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=68 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=69 name=(null) inode=14767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=70 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=71 name=(null) inode=14768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=72 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=73 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=74 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=75 name=(null) inode=14770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=76 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=77 name=(null) inode=14771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=78 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=79 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=80 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=81 name=(null) inode=14773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=82 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=83 name=(null) inode=14774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=84 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=85 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=86 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=87 name=(null) inode=14776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=88 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=89 name=(null) inode=14777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=90 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=91 name=(null) inode=14778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=92 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=93 name=(null) inode=14779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=94 name=(null) inode=14775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=95 name=(null) inode=14780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=96 name=(null) inode=14760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=97 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=98 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=99 name=(null) inode=14782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=100 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=101 name=(null) inode=14783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=102 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=103 name=(null) inode=14784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=104 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=105 name=(null) inode=14785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=106 name=(null) inode=14781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=107 name=(null) inode=14786 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PATH item=109 name=(null) inode=14787 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:04:24.597000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 16:04:24.621063 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 16:04:24.634538 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 16:04:24.634561 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 16:04:24.634725 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 16:04:24.780945 systemd[1]: Finished systemd-udev-settle.service. Dec 13 16:04:24.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.784494 systemd[1]: Starting lvm2-activation-early.service... Dec 13 16:04:24.808633 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 16:04:24.836790 systemd[1]: Finished lvm2-activation-early.service. Dec 13 16:04:24.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.838192 systemd[1]: Reached target cryptsetup.target. Dec 13 16:04:24.841985 systemd[1]: Starting lvm2-activation.service... Dec 13 16:04:24.854198 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 16:04:24.881362 systemd[1]: Finished lvm2-activation.service. Dec 13 16:04:24.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.882661 systemd[1]: Reached target local-fs-pre.target. Dec 13 16:04:24.883730 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 16:04:24.883813 systemd[1]: Reached target local-fs.target. Dec 13 16:04:24.884803 systemd[1]: Reached target machines.target. Dec 13 16:04:24.888733 systemd[1]: Starting ldconfig.service... Dec 13 16:04:24.890520 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 16:04:24.890704 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:24.894776 systemd[1]: Starting systemd-boot-update.service... Dec 13 16:04:24.898114 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 16:04:24.903302 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 16:04:24.904989 systemd[1]: Starting systemd-sysext.service... Dec 13 16:04:24.918093 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Dec 13 16:04:24.920398 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 16:04:24.922109 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 16:04:24.930136 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 16:04:24.930316 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 16:04:24.959632 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 16:04:24.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.967061 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 16:04:24.970658 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 16:04:24.972487 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 16:04:24.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:24.990108 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 16:04:25.004404 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 16:04:25.020971 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) Dec 13 16:04:25.020971 systemd-fsck[1061]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 16:04:25.023186 (sd-sysext)[1064]: Using extensions 'kubernetes'. Dec 13 16:04:25.024481 (sd-sysext)[1064]: Merged extensions into '/usr'. Dec 13 16:04:25.031854 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 16:04:25.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.033550 systemd[1]: Mounting boot.mount... Dec 13 16:04:25.052252 systemd[1]: Mounted boot.mount. Dec 13 16:04:25.057874 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:25.059729 systemd[1]: Mounting usr-share-oem.mount... Dec 13 16:04:25.060915 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.062363 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 16:04:25.065628 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 16:04:25.068699 systemd[1]: Starting modprobe@loop.service... Dec 13 16:04:25.069127 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.069269 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.069448 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:25.073696 systemd[1]: Finished systemd-boot-update.service. Dec 13 16:04:25.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.074647 systemd[1]: Mounted usr-share-oem.mount. Dec 13 16:04:25.075600 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 16:04:25.075707 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 16:04:25.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.076587 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 16:04:25.076690 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 16:04:25.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.077458 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 16:04:25.077562 systemd[1]: Finished modprobe@loop.service. Dec 13 16:04:25.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.079219 systemd[1]: Finished systemd-sysext.service. Dec 13 16:04:25.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.088134 systemd[1]: Starting ensure-sysext.service... Dec 13 16:04:25.088529 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 16:04:25.088587 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.089607 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 16:04:25.093581 systemd[1]: Reloading. Dec 13 16:04:25.115571 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 16:04:25.117612 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 16:04:25.137022 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 16:04:25.173710 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2024-12-13T16:04:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 16:04:25.173739 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2024-12-13T16:04:25Z" level=info msg="torcx already run" Dec 13 16:04:25.229416 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 16:04:25.303540 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 16:04:25.303561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 16:04:25.321347 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 16:04:25.372000 audit: BPF prog-id=27 op=LOAD Dec 13 16:04:25.372000 audit: BPF prog-id=23 op=UNLOAD Dec 13 16:04:25.373000 audit: BPF prog-id=28 op=LOAD Dec 13 16:04:25.374000 audit: BPF prog-id=18 op=UNLOAD Dec 13 16:04:25.374000 audit: BPF prog-id=29 op=LOAD Dec 13 16:04:25.374000 audit: BPF prog-id=30 op=LOAD Dec 13 16:04:25.374000 audit: BPF prog-id=19 op=UNLOAD Dec 13 16:04:25.374000 audit: BPF prog-id=20 op=UNLOAD Dec 13 16:04:25.375000 audit: BPF prog-id=31 op=LOAD Dec 13 16:04:25.375000 audit: BPF prog-id=32 op=LOAD Dec 13 16:04:25.375000 audit: BPF prog-id=21 op=UNLOAD Dec 13 16:04:25.375000 audit: BPF prog-id=22 op=UNLOAD Dec 13 16:04:25.376000 audit: BPF prog-id=33 op=LOAD Dec 13 16:04:25.376000 audit: BPF prog-id=24 op=UNLOAD Dec 13 16:04:25.376000 audit: BPF prog-id=34 op=LOAD Dec 13 16:04:25.376000 audit: BPF prog-id=35 op=LOAD Dec 13 16:04:25.376000 audit: BPF prog-id=25 op=UNLOAD Dec 13 16:04:25.376000 audit: BPF prog-id=26 op=UNLOAD Dec 13 16:04:25.378812 systemd[1]: Finished ldconfig.service. Dec 13 16:04:25.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.379568 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 16:04:25.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.381862 systemd[1]: Starting audit-rules.service... Dec 13 16:04:25.389000 audit: BPF prog-id=36 op=LOAD Dec 13 16:04:25.392000 audit: BPF prog-id=37 op=LOAD Dec 13 16:04:25.383520 systemd[1]: Starting clean-ca-certificates.service... Dec 13 16:04:25.385629 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 16:04:25.390822 systemd[1]: Starting systemd-resolved.service... Dec 13 16:04:25.393239 systemd[1]: Starting systemd-timesyncd.service... Dec 13 16:04:25.396021 systemd[1]: Starting systemd-update-utmp.service... Dec 13 16:04:25.397954 systemd[1]: Finished clean-ca-certificates.service. Dec 13 16:04:25.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.401032 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 16:04:25.413000 audit[1143]: SYSTEM_BOOT pid=1143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.418180 systemd[1]: Finished systemd-update-utmp.service. Dec 13 16:04:25.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.422129 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.423478 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 16:04:25.424955 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 16:04:25.428115 systemd[1]: Starting modprobe@loop.service... Dec 13 16:04:25.428583 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.428745 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.428888 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 16:04:25.429981 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 16:04:25.431620 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 16:04:25.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.432463 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 16:04:25.432594 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 16:04:25.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.433373 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 16:04:25.433485 systemd[1]: Finished modprobe@loop.service. Dec 13 16:04:25.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.436692 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.437909 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 16:04:25.440693 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 16:04:25.442456 systemd[1]: Starting modprobe@loop.service... Dec 13 16:04:25.444820 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.444940 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.445065 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 16:04:25.445935 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 16:04:25.446092 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 16:04:25.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.446921 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 16:04:25.447190 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 16:04:25.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.447965 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 16:04:25.449306 systemd[1]: Finished modprobe@loop.service. Dec 13 16:04:25.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.450108 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 16:04:25.450216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.453645 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.457624 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 16:04:25.467943 systemd[1]: Starting modprobe@drm.service... Dec 13 16:04:25.469982 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 16:04:25.472119 systemd[1]: Starting modprobe@loop.service... Dec 13 16:04:25.472651 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.472860 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.474684 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 16:04:25.475229 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 16:04:25.478637 systemd[1]: Finished ensure-sysext.service. Dec 13 16:04:25.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.483807 kernel: kauditd_printk_skb: 279 callbacks suppressed Dec 13 16:04:25.483838 kernel: audit: type=1130 audit(1734105865.479:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.483859 kernel: audit: type=1130 audit(1734105865.483:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.479370 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 16:04:25.479485 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 16:04:25.483560 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 16:04:25.483667 systemd[1]: Finished modprobe@drm.service. Dec 13 16:04:25.494210 kernel: audit: type=1131 audit(1734105865.483:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.494282 kernel: audit: type=1130 audit(1734105865.486:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.494539 kernel: audit: type=1131 audit(1734105865.486:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.494560 kernel: audit: type=1130 audit(1734105865.487:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.494581 kernel: audit: type=1131 audit(1734105865.487:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.487022 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 16:04:25.487182 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 16:04:25.487776 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 16:04:25.487879 systemd[1]: Finished modprobe@loop.service. Dec 13 16:04:25.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.507583 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 16:04:25.513507 kernel: audit: type=1130 audit(1734105865.507:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.513576 kernel: audit: type=1131 audit(1734105865.507:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.514966 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 16:04:25.515008 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.517333 kernel: audit: type=1130 audit(1734105865.513:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:25.516990 systemd[1]: Starting systemd-update-done.service... Dec 13 16:04:25.520000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 16:04:25.520000 audit[1170]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc0fa8db0 a2=420 a3=0 items=0 ppid=1138 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:25.520000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 16:04:25.520777 systemd[1]: Finished audit-rules.service. Dec 13 16:04:25.521652 augenrules[1170]: No rules Dec 13 16:04:25.526493 systemd[1]: Finished systemd-update-done.service. Dec 13 16:04:25.540487 systemd-resolved[1141]: Positive Trust Anchors: Dec 13 16:04:25.540517 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 16:04:25.540615 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 16:04:25.542605 systemd[1]: Started systemd-timesyncd.service. Dec 13 16:04:25.543075 systemd[1]: Reached target time-set.target. Dec 13 16:04:25.550458 systemd-resolved[1141]: Using system hostname 'srv-3qt9m.gb1.brightbox.com'. Dec 13 16:04:25.552177 systemd[1]: Started systemd-resolved.service. Dec 13 16:04:25.552649 systemd[1]: Reached target network.target. Dec 13 16:04:25.552982 systemd[1]: Reached target nss-lookup.target. Dec 13 16:04:25.553343 systemd[1]: Reached target sysinit.target. Dec 13 16:04:25.553758 systemd[1]: Started motdgen.path. Dec 13 16:04:25.554116 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 16:04:25.554664 systemd[1]: Started logrotate.timer. Dec 13 16:04:25.555081 systemd[1]: Started mdadm.timer. Dec 13 16:04:25.555415 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 16:04:25.555761 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 16:04:25.555797 systemd[1]: Reached target paths.target. Dec 13 16:04:25.556123 systemd[1]: Reached target timers.target. Dec 13 16:04:25.556773 systemd[1]: Listening on dbus.socket. Dec 13 16:04:25.558331 systemd[1]: Starting docker.socket... Dec 13 16:04:25.562533 systemd[1]: Listening on sshd.socket. Dec 13 16:04:25.563018 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.563525 systemd[1]: Listening on docker.socket. Dec 13 16:04:25.563945 systemd[1]: Reached target sockets.target. Dec 13 16:04:25.564312 systemd[1]: Reached target basic.target. Dec 13 16:04:25.564685 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.564713 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 16:04:25.565759 systemd[1]: Starting containerd.service... Dec 13 16:04:25.567177 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 16:04:25.571546 systemd[1]: Starting dbus.service... Dec 13 16:04:25.574417 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 16:04:25.577173 systemd[1]: Starting extend-filesystems.service... Dec 13 16:04:25.577661 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 16:04:25.582244 systemd[1]: Starting motdgen.service... Dec 13 16:04:25.626137 jq[1184]: false Dec 13 16:04:25.584053 systemd[1]: Starting prepare-helm.service... Dec 13 16:04:25.585917 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 16:04:25.587650 systemd[1]: Starting sshd-keygen.service... Dec 13 16:04:25.594881 systemd[1]: Starting systemd-logind.service... Dec 13 16:04:25.595350 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 16:04:25.633421 jq[1192]: true Dec 13 16:04:25.595432 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 16:04:25.595997 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 16:04:25.596932 systemd[1]: Starting update-engine.service... Dec 13 16:04:25.640567 tar[1195]: linux-amd64/helm Dec 13 16:04:25.600172 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 16:04:25.621054 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 16:04:25.641088 jq[1197]: true Dec 13 16:04:25.621248 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 16:04:25.626007 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 16:04:25.626184 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 16:04:25.657507 extend-filesystems[1185]: Found loop1 Dec 13 16:04:25.657507 extend-filesystems[1185]: Found vda Dec 13 16:04:25.657507 extend-filesystems[1185]: Found vda1 Dec 13 16:04:25.657507 extend-filesystems[1185]: Found vda2 Dec 13 16:04:25.657507 extend-filesystems[1185]: Found vda3 Dec 13 16:04:25.669441 extend-filesystems[1185]: Found usr Dec 13 16:04:25.669441 extend-filesystems[1185]: Found vda4 Dec 13 16:04:25.669441 extend-filesystems[1185]: Found vda6 Dec 13 16:04:25.669441 extend-filesystems[1185]: Found vda7 Dec 13 16:04:25.669441 extend-filesystems[1185]: Found vda9 Dec 13 16:04:25.669441 extend-filesystems[1185]: Checking size of /dev/vda9 Dec 13 16:04:25.662279 systemd[1]: Started dbus.service. Dec 13 16:04:25.662112 dbus-daemon[1182]: [system] SELinux support is enabled Dec 13 16:04:25.699400 extend-filesystems[1185]: Resized partition /dev/vda9 Dec 13 16:04:25.664861 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 16:04:25.670880 dbus-daemon[1182]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1034 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 16:04:25.705405 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 16:04:25.713477 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 16:04:25.664892 systemd[1]: Reached target system-config.target. Dec 13 16:04:25.665326 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 16:04:25.665342 systemd[1]: Reached target user-config.target. Dec 13 16:04:25.674990 systemd[1]: Starting systemd-hostnamed.service... Dec 13 16:04:25.708841 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 16:04:25.709029 systemd[1]: Finished motdgen.service. Dec 13 16:04:25.744699 update_engine[1191]: I1213 16:04:25.744005 1191 main.cc:92] Flatcar Update Engine starting Dec 13 16:04:25.753094 systemd[1]: Started update-engine.service. Dec 13 16:04:25.755550 systemd[1]: Started locksmithd.service. Dec 13 16:04:25.779853 update_engine[1191]: I1213 16:04:25.753301 1191 update_check_scheduler.cc:74] Next update check in 10m15s Dec 13 16:04:25.789427 bash[1236]: Updated "/home/core/.ssh/authorized_keys" Dec 13 16:04:25.790238 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 16:04:25.812247 dbus-daemon[1182]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 16:04:25.812407 systemd[1]: Started systemd-hostnamed.service. Dec 13 16:04:25.813146 dbus-daemon[1182]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1217 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 16:04:25.815518 systemd[1]: Starting polkit.service... Dec 13 16:04:25.818719 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 16:04:25.826727 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 16:04:25.826727 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 16:04:25.826727 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 16:04:25.828744 extend-filesystems[1185]: Resized filesystem in /dev/vda9 Dec 13 16:04:25.827286 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 16:04:25.827476 systemd[1]: Finished extend-filesystems.service. Dec 13 16:04:25.834940 polkitd[1238]: Started polkitd version 121 Dec 13 16:04:25.840423 systemd-logind[1190]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 16:04:25.841739 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 16:04:25.844508 systemd-logind[1190]: New seat seat0. Dec 13 16:04:25.855374 systemd[1]: Started systemd-logind.service. Dec 13 16:04:25.860410 env[1196]: time="2024-12-13T16:04:25.860357916Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 16:04:25.861146 polkitd[1238]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 16:04:25.861253 polkitd[1238]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 16:04:25.868199 polkitd[1238]: Finished loading, compiling and executing 2 rules Dec 13 16:04:25.868823 dbus-daemon[1182]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 16:04:25.868970 systemd[1]: Started polkit.service. Dec 13 16:04:25.869945 polkitd[1238]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 16:04:25.886654 systemd-hostnamed[1217]: Hostname set to (static) Dec 13 16:04:25.902309 env[1196]: time="2024-12-13T16:04:25.902225638Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 16:04:25.902941 env[1196]: time="2024-12-13T16:04:25.902920581Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.907860 env[1196]: time="2024-12-13T16:04:25.907826959Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 16:04:25.907860 env[1196]: time="2024-12-13T16:04:25.907858902Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.919589 env[1196]: time="2024-12-13T16:04:25.919555179Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 16:04:25.919589 env[1196]: time="2024-12-13T16:04:25.919585694Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.919689 env[1196]: time="2024-12-13T16:04:25.919602398Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 16:04:25.919689 env[1196]: time="2024-12-13T16:04:25.919615467Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.919737 env[1196]: time="2024-12-13T16:04:25.919705310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.919978 env[1196]: time="2024-12-13T16:04:25.919959524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 16:04:25.920136 env[1196]: time="2024-12-13T16:04:25.920116708Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 16:04:25.920187 env[1196]: time="2024-12-13T16:04:25.920137201Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 16:04:25.920217 env[1196]: time="2024-12-13T16:04:25.920196149Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 16:04:25.920217 env[1196]: time="2024-12-13T16:04:25.920210001Z" level=info msg="metadata content store policy set" policy=shared Dec 13 16:04:25.923461 env[1196]: time="2024-12-13T16:04:25.923436627Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 16:04:25.923535 env[1196]: time="2024-12-13T16:04:25.923466829Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 16:04:25.923535 env[1196]: time="2024-12-13T16:04:25.923481718Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 16:04:25.923535 env[1196]: time="2024-12-13T16:04:25.923525326Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923609 env[1196]: time="2024-12-13T16:04:25.923539828Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923609 env[1196]: time="2024-12-13T16:04:25.923556085Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923609 env[1196]: time="2024-12-13T16:04:25.923569266Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923609 env[1196]: time="2024-12-13T16:04:25.923583737Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923609 env[1196]: time="2024-12-13T16:04:25.923596941Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923720 env[1196]: time="2024-12-13T16:04:25.923610715Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923720 env[1196]: time="2024-12-13T16:04:25.923628301Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.923720 env[1196]: time="2024-12-13T16:04:25.923642398Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 16:04:25.923810 env[1196]: time="2024-12-13T16:04:25.923761955Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 16:04:25.923859 env[1196]: time="2024-12-13T16:04:25.923842779Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 16:04:25.924144 env[1196]: time="2024-12-13T16:04:25.924124921Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 16:04:25.924190 env[1196]: time="2024-12-13T16:04:25.924163807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924220 env[1196]: time="2024-12-13T16:04:25.924192781Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 16:04:25.924279 env[1196]: time="2024-12-13T16:04:25.924265326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924326 env[1196]: time="2024-12-13T16:04:25.924284543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924326 env[1196]: time="2024-12-13T16:04:25.924299900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924326 env[1196]: time="2024-12-13T16:04:25.924312893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924415 env[1196]: time="2024-12-13T16:04:25.924327599Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924415 env[1196]: time="2024-12-13T16:04:25.924358151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924415 env[1196]: time="2024-12-13T16:04:25.924374069Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924415 env[1196]: time="2024-12-13T16:04:25.924387432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924415 env[1196]: time="2024-12-13T16:04:25.924413142Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 16:04:25.924585 env[1196]: time="2024-12-13T16:04:25.924544464Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924585 env[1196]: time="2024-12-13T16:04:25.924563822Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924585 env[1196]: time="2024-12-13T16:04:25.924576804Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924668 env[1196]: time="2024-12-13T16:04:25.924588167Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 16:04:25.924668 env[1196]: time="2024-12-13T16:04:25.924602787Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 16:04:25.924668 env[1196]: time="2024-12-13T16:04:25.924613690Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 16:04:25.924668 env[1196]: time="2024-12-13T16:04:25.924639085Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 16:04:25.924763 env[1196]: time="2024-12-13T16:04:25.924676135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 16:04:25.924982 env[1196]: time="2024-12-13T16:04:25.924934354Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 16:04:25.926525 env[1196]: time="2024-12-13T16:04:25.924993135Z" level=info msg="Connect containerd service" Dec 13 16:04:25.926525 env[1196]: time="2024-12-13T16:04:25.925053361Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 16:04:25.929204 env[1196]: time="2024-12-13T16:04:25.928407550Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 16:04:25.931098 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:25.931168 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 16:04:25.936005 env[1196]: time="2024-12-13T16:04:25.934247184Z" level=info msg="Start subscribing containerd event" Dec 13 16:04:25.936005 env[1196]: time="2024-12-13T16:04:25.934959194Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 16:04:25.936005 env[1196]: time="2024-12-13T16:04:25.935021939Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 16:04:25.936005 env[1196]: time="2024-12-13T16:04:25.935090752Z" level=info msg="containerd successfully booted in 0.077755s" Dec 13 16:04:25.935195 systemd[1]: Started containerd.service. Dec 13 16:04:25.939940 env[1196]: time="2024-12-13T16:04:25.939918460Z" level=info msg="Start recovering state" Dec 13 16:04:25.940108 env[1196]: time="2024-12-13T16:04:25.940095325Z" level=info msg="Start event monitor" Dec 13 16:04:25.940186 env[1196]: time="2024-12-13T16:04:25.940165210Z" level=info msg="Start snapshots syncer" Dec 13 16:04:25.940253 env[1196]: time="2024-12-13T16:04:25.940241908Z" level=info msg="Start cni network conf syncer for default" Dec 13 16:04:25.940303 env[1196]: time="2024-12-13T16:04:25.940293605Z" level=info msg="Start streaming server" Dec 13 16:04:26.036840 systemd-networkd[1034]: eth0: Gained IPv6LL Dec 13 16:04:26.039382 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 16:04:26.040183 systemd[1]: Reached target network-online.target. Dec 13 16:04:26.042693 systemd[1]: Starting kubelet.service... Dec 13 16:04:26.384072 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 16:04:26.458074 systemd[1]: Finished sshd-keygen.service. Dec 13 16:04:26.469324 systemd[1]: Starting issuegen.service... Dec 13 16:04:26.478777 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 16:04:26.478953 systemd[1]: Finished issuegen.service. Dec 13 16:04:26.481107 systemd[1]: Starting systemd-user-sessions.service... Dec 13 16:04:26.494093 systemd[1]: Finished systemd-user-sessions.service. Dec 13 16:04:26.496139 systemd[1]: Started getty@tty1.service. Dec 13 16:04:26.498200 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 16:04:26.498810 systemd[1]: Reached target getty.target. Dec 13 16:04:26.502530 tar[1195]: linux-amd64/LICENSE Dec 13 16:04:26.502730 tar[1195]: linux-amd64/README.md Dec 13 16:04:26.508456 systemd[1]: Finished prepare-helm.service. Dec 13 16:04:26.559674 locksmithd[1237]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 16:04:26.632310 systemd-timesyncd[1142]: Contacted time server 95.215.175.2:123 (0.flatcar.pool.ntp.org). Dec 13 16:04:26.632786 systemd-timesyncd[1142]: Initial clock synchronization to Fri 2024-12-13 16:04:26.792263 UTC. Dec 13 16:04:27.026923 systemd[1]: Started kubelet.service. Dec 13 16:04:27.381643 systemd[1]: Created slice system-sshd.slice. Dec 13 16:04:27.385367 systemd[1]: Started sshd@0-10.244.95.154:22-139.178.68.195:42380.service. Dec 13 16:04:27.554855 systemd-networkd[1034]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17e6:24:19ff:fef4:5f9a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17e6:24:19ff:fef4:5f9a/64 assigned by NDisc. Dec 13 16:04:27.556091 systemd-networkd[1034]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 16:04:27.647265 kubelet[1275]: E1213 16:04:27.646993 1275 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 16:04:27.651460 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 16:04:27.651620 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 16:04:27.651972 systemd[1]: kubelet.service: Consumed 1.125s CPU time. Dec 13 16:04:28.313293 sshd[1282]: Accepted publickey for core from 139.178.68.195 port 42380 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:28.318397 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:28.335776 systemd[1]: Created slice user-500.slice. Dec 13 16:04:28.339235 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 16:04:28.346128 systemd-logind[1190]: New session 1 of user core. Dec 13 16:04:28.353694 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 16:04:28.356357 systemd[1]: Starting user@500.service... Dec 13 16:04:28.360118 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:28.430507 systemd[1286]: Queued start job for default target default.target. Dec 13 16:04:28.431321 systemd[1286]: Reached target paths.target. Dec 13 16:04:28.431460 systemd[1286]: Reached target sockets.target. Dec 13 16:04:28.431558 systemd[1286]: Reached target timers.target. Dec 13 16:04:28.431665 systemd[1286]: Reached target basic.target. Dec 13 16:04:28.431776 systemd[1286]: Reached target default.target. Dec 13 16:04:28.431885 systemd[1286]: Startup finished in 64ms. Dec 13 16:04:28.432164 systemd[1]: Started user@500.service. Dec 13 16:04:28.433711 systemd[1]: Started session-1.scope. Dec 13 16:04:29.088851 systemd[1]: Started sshd@1-10.244.95.154:22-139.178.68.195:42392.service. Dec 13 16:04:30.021374 sshd[1296]: Accepted publickey for core from 139.178.68.195 port 42392 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:30.025474 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:30.038173 systemd-logind[1190]: New session 2 of user core. Dec 13 16:04:30.040900 systemd[1]: Started session-2.scope. Dec 13 16:04:30.675690 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:30.683460 systemd[1]: sshd@1-10.244.95.154:22-139.178.68.195:42392.service: Deactivated successfully. Dec 13 16:04:30.685157 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 16:04:30.686270 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Dec 13 16:04:30.687712 systemd-logind[1190]: Removed session 2. Dec 13 16:04:30.829458 systemd[1]: Started sshd@2-10.244.95.154:22-139.178.68.195:42404.service. Dec 13 16:04:31.739933 sshd[1302]: Accepted publickey for core from 139.178.68.195 port 42404 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:31.744195 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:31.756082 systemd-logind[1190]: New session 3 of user core. Dec 13 16:04:31.756524 systemd[1]: Started session-3.scope. Dec 13 16:04:32.372934 sshd[1302]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:32.378756 systemd[1]: sshd@2-10.244.95.154:22-139.178.68.195:42404.service: Deactivated successfully. Dec 13 16:04:32.380385 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 16:04:32.382009 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Dec 13 16:04:32.384620 systemd-logind[1190]: Removed session 3. Dec 13 16:04:32.715193 coreos-metadata[1180]: Dec 13 16:04:32.714 WARN failed to locate config-drive, using the metadata service API instead Dec 13 16:04:32.760957 coreos-metadata[1180]: Dec 13 16:04:32.760 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 16:04:32.791625 coreos-metadata[1180]: Dec 13 16:04:32.791 INFO Fetch successful Dec 13 16:04:32.791817 coreos-metadata[1180]: Dec 13 16:04:32.791 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 16:04:32.825397 coreos-metadata[1180]: Dec 13 16:04:32.825 INFO Fetch successful Dec 13 16:04:32.827789 unknown[1180]: wrote ssh authorized keys file for user: core Dec 13 16:04:32.841385 update-ssh-keys[1310]: Updated "/home/core/.ssh/authorized_keys" Dec 13 16:04:32.842584 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 16:04:32.843527 systemd[1]: Reached target multi-user.target. Dec 13 16:04:32.845624 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 16:04:32.855430 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 16:04:32.855720 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 16:04:32.859101 systemd[1]: Startup finished in 921ms (kernel) + 7.098s (initrd) + 12.083s (userspace) = 20.104s. Dec 13 16:04:37.904093 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 16:04:37.904673 systemd[1]: Stopped kubelet.service. Dec 13 16:04:37.904807 systemd[1]: kubelet.service: Consumed 1.125s CPU time. Dec 13 16:04:37.908510 systemd[1]: Starting kubelet.service... Dec 13 16:04:38.051663 systemd[1]: Started kubelet.service. Dec 13 16:04:38.132846 kubelet[1316]: E1213 16:04:38.132777 1316 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 16:04:38.137621 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 16:04:38.137796 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 16:04:42.591509 systemd[1]: Started sshd@3-10.244.95.154:22-139.178.68.195:42658.service. Dec 13 16:04:43.496116 sshd[1322]: Accepted publickey for core from 139.178.68.195 port 42658 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:43.500654 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:43.511840 systemd[1]: Started session-4.scope. Dec 13 16:04:43.512487 systemd-logind[1190]: New session 4 of user core. Dec 13 16:04:44.125180 sshd[1322]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:44.132278 systemd[1]: sshd@3-10.244.95.154:22-139.178.68.195:42658.service: Deactivated successfully. Dec 13 16:04:44.133906 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 16:04:44.135548 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Dec 13 16:04:44.138586 systemd-logind[1190]: Removed session 4. Dec 13 16:04:44.273869 systemd[1]: Started sshd@4-10.244.95.154:22-139.178.68.195:42662.service. Dec 13 16:04:45.163747 sshd[1328]: Accepted publickey for core from 139.178.68.195 port 42662 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:45.167245 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:45.179967 systemd[1]: Started session-5.scope. Dec 13 16:04:45.181387 systemd-logind[1190]: New session 5 of user core. Dec 13 16:04:45.779970 sshd[1328]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:45.786372 systemd[1]: sshd@4-10.244.95.154:22-139.178.68.195:42662.service: Deactivated successfully. Dec 13 16:04:45.787998 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 16:04:45.789535 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Dec 13 16:04:45.792091 systemd-logind[1190]: Removed session 5. Dec 13 16:04:45.931908 systemd[1]: Started sshd@5-10.244.95.154:22-139.178.68.195:42672.service. Dec 13 16:04:46.824688 sshd[1334]: Accepted publickey for core from 139.178.68.195 port 42672 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:46.829181 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:46.838556 systemd[1]: Started session-6.scope. Dec 13 16:04:46.839456 systemd-logind[1190]: New session 6 of user core. Dec 13 16:04:47.451722 sshd[1334]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:47.458187 systemd[1]: sshd@5-10.244.95.154:22-139.178.68.195:42672.service: Deactivated successfully. Dec 13 16:04:47.459866 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 16:04:47.461506 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Dec 13 16:04:47.463474 systemd-logind[1190]: Removed session 6. Dec 13 16:04:47.602745 systemd[1]: Started sshd@6-10.244.95.154:22-139.178.68.195:60448.service. Dec 13 16:04:48.211073 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 16:04:48.211581 systemd[1]: Stopped kubelet.service. Dec 13 16:04:48.215491 systemd[1]: Starting kubelet.service... Dec 13 16:04:48.321368 systemd[1]: Started kubelet.service. Dec 13 16:04:48.371412 kubelet[1346]: E1213 16:04:48.371355 1346 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 16:04:48.373734 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 16:04:48.373912 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 16:04:48.503314 sshd[1340]: Accepted publickey for core from 139.178.68.195 port 60448 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:48.507321 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:48.518421 systemd[1]: Started session-7.scope. Dec 13 16:04:48.519089 systemd-logind[1190]: New session 7 of user core. Dec 13 16:04:48.996424 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 16:04:48.997081 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 16:04:49.011631 dbus-daemon[1182]: \xd0\xfd\xe0\x8cyU: received setenforce notice (enforcing=720802864) Dec 13 16:04:49.012470 sudo[1352]: pam_unix(sudo:session): session closed for user root Dec 13 16:04:49.157875 sshd[1340]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:49.164788 systemd[1]: sshd@6-10.244.95.154:22-139.178.68.195:60448.service: Deactivated successfully. Dec 13 16:04:49.166081 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 16:04:49.167126 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Dec 13 16:04:49.168544 systemd-logind[1190]: Removed session 7. Dec 13 16:04:49.307808 systemd[1]: Started sshd@7-10.244.95.154:22-139.178.68.195:60456.service. Dec 13 16:04:50.212751 sshd[1356]: Accepted publickey for core from 139.178.68.195 port 60456 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:50.219506 sshd[1356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:50.228801 systemd-logind[1190]: New session 8 of user core. Dec 13 16:04:50.229634 systemd[1]: Started session-8.scope. Dec 13 16:04:50.697790 sudo[1360]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 16:04:50.698962 sudo[1360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 16:04:50.707893 sudo[1360]: pam_unix(sudo:session): session closed for user root Dec 13 16:04:50.724011 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 16:04:50.724278 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 16:04:50.743272 systemd[1]: Stopping audit-rules.service... Dec 13 16:04:50.745000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 16:04:50.749017 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 16:04:50.749205 kernel: audit: type=1305 audit(1734105890.745:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 16:04:50.749582 auditctl[1363]: No rules Dec 13 16:04:50.762141 kernel: audit: type=1300 audit(1734105890.745:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdcc9badd0 a2=420 a3=0 items=0 ppid=1 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:50.745000 audit[1363]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdcc9badd0 a2=420 a3=0 items=0 ppid=1 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:50.754859 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 16:04:50.755155 systemd[1]: Stopped audit-rules.service. Dec 13 16:04:50.765351 kernel: audit: type=1327 audit(1734105890.745:216): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 16:04:50.745000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 16:04:50.763281 systemd[1]: Starting audit-rules.service... Dec 13 16:04:50.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.770271 kernel: audit: type=1131 audit(1734105890.753:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.783407 augenrules[1380]: No rules Dec 13 16:04:50.784258 systemd[1]: Finished audit-rules.service. Dec 13 16:04:50.788080 kernel: audit: type=1130 audit(1734105890.783:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.787585 sudo[1359]: pam_unix(sudo:session): session closed for user root Dec 13 16:04:50.786000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.786000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.795386 kernel: audit: type=1106 audit(1734105890.786:219): pid=1359 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.795540 kernel: audit: type=1104 audit(1734105890.786:220): pid=1359 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.930958 sshd[1356]: pam_unix(sshd:session): session closed for user core Dec 13 16:04:50.932000 audit[1356]: USER_END pid=1356 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:50.943079 kernel: audit: type=1106 audit(1734105890.932:221): pid=1356 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:50.943019 systemd[1]: sshd@7-10.244.95.154:22-139.178.68.195:60456.service: Deactivated successfully. Dec 13 16:04:50.932000 audit[1356]: CRED_DISP pid=1356 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:50.944253 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 16:04:50.950059 kernel: audit: type=1104 audit(1734105890.932:222): pid=1356 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:50.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.154:22-139.178.68.195:60456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.954079 kernel: audit: type=1131 audit(1734105890.942:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.154:22-139.178.68.195:60456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:50.954012 systemd-logind[1190]: Session 8 logged out. Waiting for processes to exit. Dec 13 16:04:50.955201 systemd-logind[1190]: Removed session 8. Dec 13 16:04:51.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.154:22-139.178.68.195:60464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:51.085150 systemd[1]: Started sshd@8-10.244.95.154:22-139.178.68.195:60464.service. Dec 13 16:04:51.989000 audit[1386]: USER_ACCT pid=1386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:51.991246 sshd[1386]: Accepted publickey for core from 139.178.68.195 port 60464 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:04:51.992000 audit[1386]: CRED_ACQ pid=1386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:51.992000 audit[1386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbb9f180 a2=3 a3=0 items=0 ppid=1 pid=1386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:51.992000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:04:51.994821 sshd[1386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:04:52.005695 systemd-logind[1190]: New session 9 of user core. Dec 13 16:04:52.007134 systemd[1]: Started session-9.scope. Dec 13 16:04:52.014000 audit[1386]: USER_START pid=1386 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:52.017000 audit[1388]: CRED_ACQ pid=1388 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:04:52.474000 audit[1389]: USER_ACCT pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:52.474000 audit[1389]: CRED_REFR pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:52.475495 sudo[1389]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 16:04:52.475778 sudo[1389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 16:04:52.477000 audit[1389]: USER_START pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:04:52.531198 systemd[1]: Starting docker.service... Dec 13 16:04:52.606813 env[1400]: time="2024-12-13T16:04:52.606748796Z" level=info msg="Starting up" Dec 13 16:04:52.610111 env[1400]: time="2024-12-13T16:04:52.610031837Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 16:04:52.610190 env[1400]: time="2024-12-13T16:04:52.610112412Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 16:04:52.610190 env[1400]: time="2024-12-13T16:04:52.610160268Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 16:04:52.610254 env[1400]: time="2024-12-13T16:04:52.610193338Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 16:04:52.624411 env[1400]: time="2024-12-13T16:04:52.624381316Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 16:04:52.624550 env[1400]: time="2024-12-13T16:04:52.624534527Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 16:04:52.624626 env[1400]: time="2024-12-13T16:04:52.624611715Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 16:04:52.624682 env[1400]: time="2024-12-13T16:04:52.624670430Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 16:04:52.632342 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2174481613-merged.mount: Deactivated successfully. Dec 13 16:04:52.654881 env[1400]: time="2024-12-13T16:04:52.654752694Z" level=info msg="Loading containers: start." Dec 13 16:04:52.744000 audit[1433]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.744000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd92124300 a2=0 a3=7ffd921242ec items=0 ppid=1400 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 16:04:52.748000 audit[1435]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.748000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffcb62a6d0 a2=0 a3=7fffcb62a6bc items=0 ppid=1400 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 16:04:52.754000 audit[1437]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.754000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbfe6b240 a2=0 a3=7fffbfe6b22c items=0 ppid=1400 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 16:04:52.758000 audit[1439]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.758000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2e65e750 a2=0 a3=7ffd2e65e73c items=0 ppid=1400 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 16:04:52.762000 audit[1441]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.762000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe46e1eee0 a2=0 a3=7ffe46e1eecc items=0 ppid=1400 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 16:04:52.793000 audit[1446]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.793000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff33bb5170 a2=0 a3=7fff33bb515c items=0 ppid=1400 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 16:04:52.800000 audit[1448]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.800000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd833d0280 a2=0 a3=7ffd833d026c items=0 ppid=1400 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 16:04:52.803000 audit[1450]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.803000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffde04843f0 a2=0 a3=7ffde04843dc items=0 ppid=1400 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 16:04:52.805000 audit[1452]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.805000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff4ef49100 a2=0 a3=7fff4ef490ec items=0 ppid=1400 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 16:04:52.813000 audit[1456]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.813000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffeb0d4bc0 a2=0 a3=7fffeb0d4bac items=0 ppid=1400 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 16:04:52.819000 audit[1457]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.819000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd3da98170 a2=0 a3=7ffd3da9815c items=0 ppid=1400 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 16:04:52.834256 kernel: Initializing XFRM netlink socket Dec 13 16:04:52.886175 env[1400]: time="2024-12-13T16:04:52.886123699Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 16:04:52.919000 audit[1465]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.919000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdd39abd70 a2=0 a3=7ffdd39abd5c items=0 ppid=1400 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 16:04:52.931000 audit[1468]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.931000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffda9f78d80 a2=0 a3=7ffda9f78d6c items=0 ppid=1400 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 16:04:52.935000 audit[1471]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.935000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdd27ee190 a2=0 a3=7ffdd27ee17c items=0 ppid=1400 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 16:04:52.937000 audit[1473]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.937000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeaec4acd0 a2=0 a3=7ffeaec4acbc items=0 ppid=1400 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 16:04:52.940000 audit[1475]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.940000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffee2869170 a2=0 a3=7ffee286915c items=0 ppid=1400 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 16:04:52.942000 audit[1477]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.942000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe691c7ce0 a2=0 a3=7ffe691c7ccc items=0 ppid=1400 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 16:04:52.944000 audit[1479]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.944000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeeda395e0 a2=0 a3=7ffeeda395cc items=0 ppid=1400 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 16:04:52.956000 audit[1482]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.956000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe1ff9d230 a2=0 a3=7ffe1ff9d21c items=0 ppid=1400 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 16:04:52.959000 audit[1484]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.959000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd0acfa160 a2=0 a3=7ffd0acfa14c items=0 ppid=1400 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 16:04:52.961000 audit[1486]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.961000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd364698b0 a2=0 a3=7ffd3646989c items=0 ppid=1400 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 16:04:52.964000 audit[1488]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.964000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc16833d0 a2=0 a3=7ffcc16833bc items=0 ppid=1400 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 16:04:52.965773 systemd-networkd[1034]: docker0: Link UP Dec 13 16:04:52.970000 audit[1492]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.970000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8c554de0 a2=0 a3=7ffe8c554dcc items=0 ppid=1400 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 16:04:52.974000 audit[1493]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:04:52.974000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff44247780 a2=0 a3=7fff4424776c items=0 ppid=1400 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:04:52.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 16:04:52.976535 env[1400]: time="2024-12-13T16:04:52.976506078Z" level=info msg="Loading containers: done." Dec 13 16:04:52.990731 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck537537934-merged.mount: Deactivated successfully. Dec 13 16:04:52.998022 env[1400]: time="2024-12-13T16:04:52.997827029Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 16:04:52.999715 env[1400]: time="2024-12-13T16:04:52.999534244Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 16:04:52.999715 env[1400]: time="2024-12-13T16:04:52.999654074Z" level=info msg="Daemon has completed initialization" Dec 13 16:04:53.016203 systemd[1]: Started docker.service. Dec 13 16:04:53.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:53.024917 env[1400]: time="2024-12-13T16:04:53.024863277Z" level=info msg="API listen on /run/docker.sock" Dec 13 16:04:54.974345 env[1196]: time="2024-12-13T16:04:54.974240782Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 16:04:55.963752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount584608794.mount: Deactivated successfully. Dec 13 16:04:57.522659 env[1196]: time="2024-12-13T16:04:57.522551481Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:57.526248 env[1196]: time="2024-12-13T16:04:57.526200962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:57.529209 env[1196]: time="2024-12-13T16:04:57.529172726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:57.531457 env[1196]: time="2024-12-13T16:04:57.531394332Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 16:04:57.533982 env[1196]: time="2024-12-13T16:04:57.533922494Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:57.534367 env[1196]: time="2024-12-13T16:04:57.534322982Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 16:04:57.604291 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 16:04:57.609713 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 16:04:57.609894 kernel: audit: type=1131 audit(1734105897.603:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:57.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:57.624000 audit: BPF prog-id=43 op=UNLOAD Dec 13 16:04:57.624000 audit: BPF prog-id=42 op=UNLOAD Dec 13 16:04:57.624000 audit: BPF prog-id=41 op=UNLOAD Dec 13 16:04:57.628086 kernel: audit: type=1334 audit(1734105897.624:259): prog-id=43 op=UNLOAD Dec 13 16:04:57.628140 kernel: audit: type=1334 audit(1734105897.624:260): prog-id=42 op=UNLOAD Dec 13 16:04:57.628173 kernel: audit: type=1334 audit(1734105897.624:261): prog-id=41 op=UNLOAD Dec 13 16:04:58.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.460312 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 16:04:58.460563 systemd[1]: Stopped kubelet.service. Dec 13 16:04:58.462978 systemd[1]: Starting kubelet.service... Dec 13 16:04:58.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.467968 kernel: audit: type=1130 audit(1734105898.459:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.468031 kernel: audit: type=1131 audit(1734105898.459:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.595776 systemd[1]: Started kubelet.service. Dec 13 16:04:58.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.603201 kernel: audit: type=1130 audit(1734105898.595:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:04:58.667531 kubelet[1534]: E1213 16:04:58.667339 1534 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 16:04:58.669485 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 16:04:58.669672 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 16:04:58.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 16:04:58.673193 kernel: audit: type=1131 audit(1734105898.668:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 16:04:59.415672 env[1196]: time="2024-12-13T16:04:59.415562292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:59.427524 env[1196]: time="2024-12-13T16:04:59.427346781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:59.428719 env[1196]: time="2024-12-13T16:04:59.428680129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:59.430757 env[1196]: time="2024-12-13T16:04:59.430702877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:04:59.431953 env[1196]: time="2024-12-13T16:04:59.431887602Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 16:04:59.433411 env[1196]: time="2024-12-13T16:04:59.433381321Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 16:05:00.971486 env[1196]: time="2024-12-13T16:05:00.971400600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:00.975401 env[1196]: time="2024-12-13T16:05:00.975339103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:00.977427 env[1196]: time="2024-12-13T16:05:00.977388268Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:00.979361 env[1196]: time="2024-12-13T16:05:00.979301590Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 16:05:00.981207 env[1196]: time="2024-12-13T16:05:00.981175824Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:00.982255 env[1196]: time="2024-12-13T16:05:00.982204163Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 16:05:02.391786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount679684333.mount: Deactivated successfully. Dec 13 16:05:03.172964 env[1196]: time="2024-12-13T16:05:03.172876659Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:03.175496 env[1196]: time="2024-12-13T16:05:03.175448084Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:03.177329 env[1196]: time="2024-12-13T16:05:03.177282270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:03.179124 env[1196]: time="2024-12-13T16:05:03.179082660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:03.180191 env[1196]: time="2024-12-13T16:05:03.180148519Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 16:05:03.181083 env[1196]: time="2024-12-13T16:05:03.181023637Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 16:05:03.836640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount59635384.mount: Deactivated successfully. Dec 13 16:05:04.925083 env[1196]: time="2024-12-13T16:05:04.924908194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:04.928231 env[1196]: time="2024-12-13T16:05:04.928185335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:04.932119 env[1196]: time="2024-12-13T16:05:04.932084717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:04.933108 env[1196]: time="2024-12-13T16:05:04.933070886Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 16:05:04.933822 env[1196]: time="2024-12-13T16:05:04.933789298Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 16:05:04.935440 env[1196]: time="2024-12-13T16:05:04.934876067Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:05.520949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount42088677.mount: Deactivated successfully. Dec 13 16:05:05.527577 env[1196]: time="2024-12-13T16:05:05.527485409Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:05.529470 env[1196]: time="2024-12-13T16:05:05.529413689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:05.532195 env[1196]: time="2024-12-13T16:05:05.532148737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:05.533587 env[1196]: time="2024-12-13T16:05:05.533532350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:05.533816 env[1196]: time="2024-12-13T16:05:05.533765940Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 16:05:05.536353 env[1196]: time="2024-12-13T16:05:05.536301700Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 16:05:06.132611 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1116459334.mount: Deactivated successfully. Dec 13 16:05:08.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.711973 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 16:05:08.712897 systemd[1]: Stopped kubelet.service. Dec 13 16:05:08.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.721684 kernel: audit: type=1130 audit(1734105908.711:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.721795 kernel: audit: type=1131 audit(1734105908.712:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.721389 systemd[1]: Starting kubelet.service... Dec 13 16:05:08.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.864014 systemd[1]: Started kubelet.service. Dec 13 16:05:08.868146 kernel: audit: type=1130 audit(1734105908.863:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:08.932025 kubelet[1545]: E1213 16:05:08.931972 1545 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 16:05:08.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 16:05:08.933572 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 16:05:08.933702 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 16:05:08.937059 kernel: audit: type=1131 audit(1734105908.932:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 16:05:08.952044 env[1196]: time="2024-12-13T16:05:08.951984666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:08.953341 env[1196]: time="2024-12-13T16:05:08.953312722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:08.955445 env[1196]: time="2024-12-13T16:05:08.955419732Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:08.957578 env[1196]: time="2024-12-13T16:05:08.957548358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:08.958762 env[1196]: time="2024-12-13T16:05:08.958724316Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 16:05:10.761370 update_engine[1191]: I1213 16:05:10.761220 1191 update_attempter.cc:509] Updating boot flags... Dec 13 16:05:11.314271 systemd[1]: Stopped kubelet.service. Dec 13 16:05:11.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.320271 kernel: audit: type=1130 audit(1734105911.313:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.320380 kernel: audit: type=1131 audit(1734105911.313:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.318821 systemd[1]: Starting kubelet.service... Dec 13 16:05:11.360872 systemd[1]: Reloading. Dec 13 16:05:11.465019 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2024-12-13T16:05:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 16:05:11.474137 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2024-12-13T16:05:11Z" level=info msg="torcx already run" Dec 13 16:05:11.578738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 16:05:11.579379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 16:05:11.599690 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 16:05:11.683071 kernel: audit: type=1400 audit(1734105911.672:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.683227 kernel: audit: type=1400 audit(1734105911.672:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.683281 kernel: audit: type=1400 audit(1734105911.675:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.683323 kernel: audit: type=1400 audit(1734105911.675:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.680000 audit: BPF prog-id=46 op=LOAD Dec 13 16:05:11.680000 audit: BPF prog-id=37 op=UNLOAD Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit: BPF prog-id=47 op=LOAD Dec 13 16:05:11.685000 audit: BPF prog-id=27 op=UNLOAD Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.685000 audit: BPF prog-id=48 op=LOAD Dec 13 16:05:11.685000 audit: BPF prog-id=36 op=UNLOAD Dec 13 16:05:11.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.687000 audit: BPF prog-id=49 op=LOAD Dec 13 16:05:11.687000 audit: BPF prog-id=44 op=UNLOAD Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit: BPF prog-id=50 op=LOAD Dec 13 16:05:11.688000 audit: BPF prog-id=28 op=UNLOAD Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit: BPF prog-id=51 op=LOAD Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.688000 audit: BPF prog-id=52 op=LOAD Dec 13 16:05:11.688000 audit: BPF prog-id=29 op=UNLOAD Dec 13 16:05:11.688000 audit: BPF prog-id=30 op=UNLOAD Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit: BPF prog-id=53 op=LOAD Dec 13 16:05:11.690000 audit: BPF prog-id=38 op=UNLOAD Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit: BPF prog-id=54 op=LOAD Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.690000 audit: BPF prog-id=55 op=LOAD Dec 13 16:05:11.690000 audit: BPF prog-id=39 op=UNLOAD Dec 13 16:05:11.690000 audit: BPF prog-id=40 op=UNLOAD Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit: BPF prog-id=56 op=LOAD Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.691000 audit: BPF prog-id=57 op=LOAD Dec 13 16:05:11.691000 audit: BPF prog-id=31 op=UNLOAD Dec 13 16:05:11.691000 audit: BPF prog-id=32 op=UNLOAD Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit: BPF prog-id=58 op=LOAD Dec 13 16:05:11.693000 audit: BPF prog-id=33 op=UNLOAD Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit: BPF prog-id=59 op=LOAD Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:11.693000 audit: BPF prog-id=60 op=LOAD Dec 13 16:05:11.693000 audit: BPF prog-id=34 op=UNLOAD Dec 13 16:05:11.693000 audit: BPF prog-id=35 op=UNLOAD Dec 13 16:05:11.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.712703 systemd[1]: Started kubelet.service. Dec 13 16:05:11.714969 systemd[1]: Stopping kubelet.service... Dec 13 16:05:11.715573 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 16:05:11.715806 systemd[1]: Stopped kubelet.service. Dec 13 16:05:11.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.717625 systemd[1]: Starting kubelet.service... Dec 13 16:05:11.822111 systemd[1]: Started kubelet.service. Dec 13 16:05:11.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:11.879754 kubelet[1663]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 16:05:11.879754 kubelet[1663]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 16:05:11.879754 kubelet[1663]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 16:05:11.879754 kubelet[1663]: I1213 16:05:11.874786 1663 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 16:05:12.267533 kubelet[1663]: I1213 16:05:12.267472 1663 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 16:05:12.267798 kubelet[1663]: I1213 16:05:12.267772 1663 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 16:05:12.268434 kubelet[1663]: I1213 16:05:12.268403 1663 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 16:05:12.327593 kubelet[1663]: E1213 16:05:12.327555 1663 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.95.154:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:12.327980 kubelet[1663]: I1213 16:05:12.327956 1663 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 16:05:12.345533 kubelet[1663]: E1213 16:05:12.345478 1663 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 16:05:12.345533 kubelet[1663]: I1213 16:05:12.345532 1663 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 16:05:12.355325 kubelet[1663]: I1213 16:05:12.355289 1663 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 16:05:12.357799 kubelet[1663]: I1213 16:05:12.357527 1663 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 16:05:12.358313 kubelet[1663]: I1213 16:05:12.358239 1663 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 16:05:12.358830 kubelet[1663]: I1213 16:05:12.358327 1663 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-3qt9m.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 16:05:12.359014 kubelet[1663]: I1213 16:05:12.358908 1663 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 16:05:12.359014 kubelet[1663]: I1213 16:05:12.358938 1663 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 16:05:12.359252 kubelet[1663]: I1213 16:05:12.359222 1663 state_mem.go:36] "Initialized new in-memory state store" Dec 13 16:05:12.370717 kubelet[1663]: I1213 16:05:12.370670 1663 kubelet.go:408] "Attempting to sync node with API server" Dec 13 16:05:12.370885 kubelet[1663]: I1213 16:05:12.370873 1663 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 16:05:12.371017 kubelet[1663]: I1213 16:05:12.371007 1663 kubelet.go:314] "Adding apiserver pod source" Dec 13 16:05:12.372745 kubelet[1663]: W1213 16:05:12.372633 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.95.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3qt9m.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:12.372873 kubelet[1663]: E1213 16:05:12.372787 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.95.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3qt9m.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:12.372913 kubelet[1663]: I1213 16:05:12.372870 1663 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 16:05:12.392330 kubelet[1663]: I1213 16:05:12.392292 1663 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 16:05:12.395301 kubelet[1663]: I1213 16:05:12.395277 1663 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 16:05:12.395892 kubelet[1663]: W1213 16:05:12.395848 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.95.154:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:12.396019 kubelet[1663]: E1213 16:05:12.396001 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.95.154:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:12.396963 kubelet[1663]: W1213 16:05:12.396932 1663 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 16:05:12.397993 kubelet[1663]: I1213 16:05:12.397587 1663 server.go:1269] "Started kubelet" Dec 13 16:05:12.398679 kubelet[1663]: I1213 16:05:12.398652 1663 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 16:05:12.399910 kubelet[1663]: I1213 16:05:12.399892 1663 server.go:460] "Adding debug handlers to kubelet server" Dec 13 16:05:12.402597 kubelet[1663]: I1213 16:05:12.402559 1663 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 16:05:12.402722 kubelet[1663]: I1213 16:05:12.402707 1663 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 16:05:12.402868 kubelet[1663]: I1213 16:05:12.402858 1663 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 16:05:12.401000 audit[1663]: AVC avc: denied { mac_admin } for pid=1663 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:12.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:12.401000 audit[1663]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000658f90 a1=c0007244b0 a2=c000658f60 a3=25 items=0 ppid=1 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:12.401000 audit[1663]: AVC avc: denied { mac_admin } for pid=1663 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:12.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:12.401000 audit[1663]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00019f100 a1=c0007244c8 a2=c000659020 a3=25 items=0 ppid=1 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:12.404331 kubelet[1663]: I1213 16:05:12.404245 1663 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 16:05:12.404693 kubelet[1663]: I1213 16:05:12.404666 1663 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 16:05:12.407841 kubelet[1663]: E1213 16:05:12.405205 1663 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.95.154:6443/api/v1/namespaces/default/events\": dial tcp 10.244.95.154:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-3qt9m.gb1.brightbox.com.1810c823bf5c7868 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-3qt9m.gb1.brightbox.com,UID:srv-3qt9m.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-3qt9m.gb1.brightbox.com,},FirstTimestamp:2024-12-13 16:05:12.397559912 +0000 UTC m=+0.569296324,LastTimestamp:2024-12-13 16:05:12.397559912 +0000 UTC m=+0.569296324,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-3qt9m.gb1.brightbox.com,}" Dec 13 16:05:12.409006 kubelet[1663]: I1213 16:05:12.408752 1663 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 16:05:12.409000 audit[1674]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.409000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff854918a0 a2=0 a3=7fff8549188c items=0 ppid=1663 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 16:05:12.411000 audit[1675]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.411000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff90de6f20 a2=0 a3=7fff90de6f0c items=0 ppid=1663 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 16:05:12.414289 kubelet[1663]: E1213 16:05:12.413935 1663 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-3qt9m.gb1.brightbox.com\" not found" Dec 13 16:05:12.414289 kubelet[1663]: I1213 16:05:12.414026 1663 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 16:05:12.414406 kubelet[1663]: I1213 16:05:12.414342 1663 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 16:05:12.414505 kubelet[1663]: I1213 16:05:12.414484 1663 reconciler.go:26] "Reconciler: start to sync state" Dec 13 16:05:12.415229 kubelet[1663]: W1213 16:05:12.415122 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.95.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:12.415229 kubelet[1663]: E1213 16:05:12.415208 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.95.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:12.415514 kubelet[1663]: I1213 16:05:12.415498 1663 factory.go:221] Registration of the systemd container factory successfully Dec 13 16:05:12.415589 kubelet[1663]: I1213 16:05:12.415575 1663 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 16:05:12.417220 kubelet[1663]: E1213 16:05:12.417195 1663 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3qt9m.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.154:6443: connect: connection refused" interval="200ms" Dec 13 16:05:12.417561 kubelet[1663]: E1213 16:05:12.417545 1663 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 16:05:12.416000 audit[1677]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.416000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe4ef06720 a2=0 a3=7ffe4ef0670c items=0 ppid=1663 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 16:05:12.418205 kubelet[1663]: I1213 16:05:12.418187 1663 factory.go:221] Registration of the containerd container factory successfully Dec 13 16:05:12.419000 audit[1679]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.419000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff1562a020 a2=0 a3=7fff1562a00c items=0 ppid=1663 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 16:05:12.431000 audit[1682]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.431000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff6cc81eb0 a2=0 a3=7fff6cc81e9c items=0 ppid=1663 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 16:05:12.433117 kubelet[1663]: I1213 16:05:12.433065 1663 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 16:05:12.433000 audit[1683]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:12.433000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4ab12470 a2=0 a3=7ffd4ab1245c items=0 ppid=1663 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 16:05:12.434640 kubelet[1663]: I1213 16:05:12.434599 1663 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 16:05:12.434819 kubelet[1663]: I1213 16:05:12.434788 1663 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 16:05:12.434951 kubelet[1663]: I1213 16:05:12.434935 1663 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 16:05:12.435211 kubelet[1663]: E1213 16:05:12.435182 1663 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 16:05:12.435000 audit[1684]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.435000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5611fb50 a2=0 a3=7fff5611fb3c items=0 ppid=1663 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 16:05:12.436000 audit[1685]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.436000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7e8d1c10 a2=0 a3=7ffd7e8d1bfc items=0 ppid=1663 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 16:05:12.437000 audit[1686]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:12.437000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce73c08f0 a2=0 a3=7ffce73c08dc items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 16:05:12.439000 audit[1687]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:12.439000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff952c7df0 a2=0 a3=7fff952c7ddc items=0 ppid=1663 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 16:05:12.439000 audit[1688]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:12.439000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd309ed4e0 a2=0 a3=7ffd309ed4cc items=0 ppid=1663 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 16:05:12.441000 audit[1689]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:12.441000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4a7c1d90 a2=0 a3=7ffe4a7c1d7c items=0 ppid=1663 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 16:05:12.442834 kubelet[1663]: W1213 16:05:12.442135 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.95.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:12.442834 kubelet[1663]: E1213 16:05:12.442182 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.95.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:12.457627 kubelet[1663]: I1213 16:05:12.457578 1663 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 16:05:12.457627 kubelet[1663]: I1213 16:05:12.457623 1663 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 16:05:12.457788 kubelet[1663]: I1213 16:05:12.457662 1663 state_mem.go:36] "Initialized new in-memory state store" Dec 13 16:05:12.459451 kubelet[1663]: I1213 16:05:12.459415 1663 policy_none.go:49] "None policy: Start" Dec 13 16:05:12.460903 kubelet[1663]: I1213 16:05:12.460878 1663 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 16:05:12.460981 kubelet[1663]: I1213 16:05:12.460929 1663 state_mem.go:35] "Initializing new in-memory state store" Dec 13 16:05:12.478723 systemd[1]: Created slice kubepods.slice. Dec 13 16:05:12.484596 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 16:05:12.487656 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 16:05:12.494154 kubelet[1663]: I1213 16:05:12.494130 1663 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 16:05:12.493000 audit[1663]: AVC avc: denied { mac_admin } for pid=1663 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:12.493000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:12.493000 audit[1663]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e840f0 a1=c000e62090 a2=c000e840c0 a3=25 items=0 ppid=1 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:12.493000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:12.495268 kubelet[1663]: I1213 16:05:12.495249 1663 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 16:05:12.495865 kubelet[1663]: I1213 16:05:12.495850 1663 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 16:05:12.496009 kubelet[1663]: I1213 16:05:12.495957 1663 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 16:05:12.496965 kubelet[1663]: I1213 16:05:12.496502 1663 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 16:05:12.497988 kubelet[1663]: E1213 16:05:12.497963 1663 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-3qt9m.gb1.brightbox.com\" not found" Dec 13 16:05:12.548826 systemd[1]: Created slice kubepods-burstable-podcf23034a0616a51988820481f034bf76.slice. Dec 13 16:05:12.560578 systemd[1]: Created slice kubepods-burstable-pod6c5822a137239f8bd53e38f7e6bf9c76.slice. Dec 13 16:05:12.567228 systemd[1]: Created slice kubepods-burstable-pod51a062d7b3b12a63ebbf081a5988d8fe.slice. Dec 13 16:05:12.601127 kubelet[1663]: I1213 16:05:12.601077 1663 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.602439 kubelet[1663]: E1213 16:05:12.602353 1663 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.95.154:6443/api/v1/nodes\": dial tcp 10.244.95.154:6443: connect: connection refused" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616231 kubelet[1663]: I1213 16:05:12.616129 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-k8s-certs\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616231 kubelet[1663]: I1213 16:05:12.616187 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-flexvolume-dir\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616231 kubelet[1663]: I1213 16:05:12.616225 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-k8s-certs\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616231 kubelet[1663]: I1213 16:05:12.616250 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616705 kubelet[1663]: I1213 16:05:12.616278 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/51a062d7b3b12a63ebbf081a5988d8fe-kubeconfig\") pod \"kube-scheduler-srv-3qt9m.gb1.brightbox.com\" (UID: \"51a062d7b3b12a63ebbf081a5988d8fe\") " pod="kube-system/kube-scheduler-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616705 kubelet[1663]: I1213 16:05:12.616300 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-ca-certs\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616705 kubelet[1663]: I1213 16:05:12.616323 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-kubeconfig\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616705 kubelet[1663]: I1213 16:05:12.616345 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-usr-share-ca-certificates\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.616705 kubelet[1663]: I1213 16:05:12.616367 1663 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-ca-certs\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.618157 kubelet[1663]: E1213 16:05:12.618092 1663 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3qt9m.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.154:6443: connect: connection refused" interval="400ms" Dec 13 16:05:12.807500 kubelet[1663]: I1213 16:05:12.807319 1663 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.809241 kubelet[1663]: E1213 16:05:12.809178 1663 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.95.154:6443/api/v1/nodes\": dial tcp 10.244.95.154:6443: connect: connection refused" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:12.862275 env[1196]: time="2024-12-13T16:05:12.861702185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-3qt9m.gb1.brightbox.com,Uid:cf23034a0616a51988820481f034bf76,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:12.864631 env[1196]: time="2024-12-13T16:05:12.864570497Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-3qt9m.gb1.brightbox.com,Uid:6c5822a137239f8bd53e38f7e6bf9c76,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:12.870133 env[1196]: time="2024-12-13T16:05:12.869909479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-3qt9m.gb1.brightbox.com,Uid:51a062d7b3b12a63ebbf081a5988d8fe,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:13.019746 kubelet[1663]: E1213 16:05:13.019542 1663 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3qt9m.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.154:6443: connect: connection refused" interval="800ms" Dec 13 16:05:13.211340 kubelet[1663]: W1213 16:05:13.211027 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.95.154:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:13.211340 kubelet[1663]: E1213 16:05:13.211216 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.95.154:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:13.214821 kubelet[1663]: I1213 16:05:13.214771 1663 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:13.215784 kubelet[1663]: E1213 16:05:13.215429 1663 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.95.154:6443/api/v1/nodes\": dial tcp 10.244.95.154:6443: connect: connection refused" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:13.281955 kubelet[1663]: W1213 16:05:13.281788 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.95.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3qt9m.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:13.281955 kubelet[1663]: E1213 16:05:13.281937 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.95.154:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3qt9m.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:13.343466 kubelet[1663]: W1213 16:05:13.343360 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.95.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:13.343466 kubelet[1663]: E1213 16:05:13.343452 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.95.154:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:13.422398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3695313423.mount: Deactivated successfully. Dec 13 16:05:13.427002 env[1196]: time="2024-12-13T16:05:13.426960592Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.429607 env[1196]: time="2024-12-13T16:05:13.429567035Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.432328 env[1196]: time="2024-12-13T16:05:13.432301467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.437670 env[1196]: time="2024-12-13T16:05:13.437631735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.438697 env[1196]: time="2024-12-13T16:05:13.438660856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.443501 env[1196]: time="2024-12-13T16:05:13.443465139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.446683 env[1196]: time="2024-12-13T16:05:13.446653381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.447634 env[1196]: time="2024-12-13T16:05:13.447601285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.448455 env[1196]: time="2024-12-13T16:05:13.448430697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.449120 env[1196]: time="2024-12-13T16:05:13.449098187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.449774 env[1196]: time="2024-12-13T16:05:13.449729411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.450397 env[1196]: time="2024-12-13T16:05:13.450374942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:13.477270 env[1196]: time="2024-12-13T16:05:13.476475838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:13.477440 env[1196]: time="2024-12-13T16:05:13.476519493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:13.477440 env[1196]: time="2024-12-13T16:05:13.476531233Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:13.477440 env[1196]: time="2024-12-13T16:05:13.476651679Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/590219e129ad37d0ea7d10618bc203db60042d74da897d074d293f3289dda437 pid=1718 runtime=io.containerd.runc.v2 Dec 13 16:05:13.480401 env[1196]: time="2024-12-13T16:05:13.480342913Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:13.480523 env[1196]: time="2024-12-13T16:05:13.480378017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:13.480523 env[1196]: time="2024-12-13T16:05:13.480388934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:13.480709 env[1196]: time="2024-12-13T16:05:13.480651612Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:13.480795 env[1196]: time="2024-12-13T16:05:13.480672401Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15842d70b7b843c032c60afad29caaf516767808396f23ebc2dad8048fb94001 pid=1706 runtime=io.containerd.runc.v2 Dec 13 16:05:13.480908 env[1196]: time="2024-12-13T16:05:13.480884361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:13.481007 env[1196]: time="2024-12-13T16:05:13.480985363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:13.481234 env[1196]: time="2024-12-13T16:05:13.481202150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b81b45b494e9ef2cb36970a989e4d4f5f58641192725ce8ef7a55dd928757c70 pid=1717 runtime=io.containerd.runc.v2 Dec 13 16:05:13.502469 systemd[1]: Started cri-containerd-15842d70b7b843c032c60afad29caaf516767808396f23ebc2dad8048fb94001.scope. Dec 13 16:05:13.525625 systemd[1]: Started cri-containerd-590219e129ad37d0ea7d10618bc203db60042d74da897d074d293f3289dda437.scope. Dec 13 16:05:13.539277 systemd[1]: Started cri-containerd-b81b45b494e9ef2cb36970a989e4d4f5f58641192725ce8ef7a55dd928757c70.scope. Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.553000 audit: BPF prog-id=61 op=LOAD Dec 13 16:05:13.554000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.554000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303231396531323961643337643065613764313036313862633230 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303231396531323961643337643065613764313036313862633230 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.555000 audit: BPF prog-id=62 op=LOAD Dec 13 16:05:13.555000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c0560 items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303231396531323961643337643065613764313036313862633230 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit: BPF prog-id=63 op=LOAD Dec 13 16:05:13.556000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c05a8 items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303231396531323961643337643065613764313036313862633230 Dec 13 16:05:13.556000 audit: BPF prog-id=63 op=UNLOAD Dec 13 16:05:13.556000 audit: BPF prog-id=62 op=UNLOAD Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.556000 audit: BPF prog-id=64 op=LOAD Dec 13 16:05:13.556000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c09b8 items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303231396531323961643337643065613764313036313862633230 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit: BPF prog-id=65 op=LOAD Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1706 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135383432643730623762383433633033326336306166616432396361 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1706 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135383432643730623762383433633033326336306166616432396361 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit: BPF prog-id=66 op=LOAD Dec 13 16:05:13.558000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034a3f0 items=0 ppid=1706 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135383432643730623762383433633033326336306166616432396361 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit: BPF prog-id=67 op=LOAD Dec 13 16:05:13.558000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034a438 items=0 ppid=1706 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135383432643730623762383433633033326336306166616432396361 Dec 13 16:05:13.558000 audit: BPF prog-id=67 op=UNLOAD Dec 13 16:05:13.558000 audit: BPF prog-id=66 op=UNLOAD Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.558000 audit: BPF prog-id=68 op=LOAD Dec 13 16:05:13.558000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034a848 items=0 ppid=1706 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135383432643730623762383433633033326336306166616432396361 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.576000 audit: BPF prog-id=69 op=LOAD Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316234356234393465396566326362333639373061393839653464 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316234356234393465396566326362333639373061393839653464 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit: BPF prog-id=70 op=LOAD Dec 13 16:05:13.577000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ae2d0 items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316234356234393465396566326362333639373061393839653464 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit: BPF prog-id=71 op=LOAD Dec 13 16:05:13.577000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ae318 items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316234356234393465396566326362333639373061393839653464 Dec 13 16:05:13.577000 audit: BPF prog-id=71 op=UNLOAD Dec 13 16:05:13.577000 audit: BPF prog-id=70 op=UNLOAD Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.577000 audit: BPF prog-id=72 op=LOAD Dec 13 16:05:13.577000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ae728 items=0 ppid=1717 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316234356234393465396566326362333639373061393839653464 Dec 13 16:05:13.603505 env[1196]: time="2024-12-13T16:05:13.603452782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-3qt9m.gb1.brightbox.com,Uid:cf23034a0616a51988820481f034bf76,Namespace:kube-system,Attempt:0,} returns sandbox id \"590219e129ad37d0ea7d10618bc203db60042d74da897d074d293f3289dda437\"" Dec 13 16:05:13.608632 env[1196]: time="2024-12-13T16:05:13.608589138Z" level=info msg="CreateContainer within sandbox \"590219e129ad37d0ea7d10618bc203db60042d74da897d074d293f3289dda437\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 16:05:13.625571 env[1196]: time="2024-12-13T16:05:13.625526289Z" level=info msg="CreateContainer within sandbox \"590219e129ad37d0ea7d10618bc203db60042d74da897d074d293f3289dda437\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3ec61610d94d58517d57ca97938890141006f90115ecb25b583a70efa91b0690\"" Dec 13 16:05:13.626314 env[1196]: time="2024-12-13T16:05:13.626285503Z" level=info msg="StartContainer for \"3ec61610d94d58517d57ca97938890141006f90115ecb25b583a70efa91b0690\"" Dec 13 16:05:13.636846 env[1196]: time="2024-12-13T16:05:13.636803264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-3qt9m.gb1.brightbox.com,Uid:6c5822a137239f8bd53e38f7e6bf9c76,Namespace:kube-system,Attempt:0,} returns sandbox id \"b81b45b494e9ef2cb36970a989e4d4f5f58641192725ce8ef7a55dd928757c70\"" Dec 13 16:05:13.642611 env[1196]: time="2024-12-13T16:05:13.642568985Z" level=info msg="CreateContainer within sandbox \"b81b45b494e9ef2cb36970a989e4d4f5f58641192725ce8ef7a55dd928757c70\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 16:05:13.642948 env[1196]: time="2024-12-13T16:05:13.642924726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-3qt9m.gb1.brightbox.com,Uid:51a062d7b3b12a63ebbf081a5988d8fe,Namespace:kube-system,Attempt:0,} returns sandbox id \"15842d70b7b843c032c60afad29caaf516767808396f23ebc2dad8048fb94001\"" Dec 13 16:05:13.647023 env[1196]: time="2024-12-13T16:05:13.646970647Z" level=info msg="CreateContainer within sandbox \"15842d70b7b843c032c60afad29caaf516767808396f23ebc2dad8048fb94001\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 16:05:13.652921 env[1196]: time="2024-12-13T16:05:13.652865468Z" level=info msg="CreateContainer within sandbox \"b81b45b494e9ef2cb36970a989e4d4f5f58641192725ce8ef7a55dd928757c70\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"86cf45a15dd4b1fd34be363adbd3e380cf0a75adb3afa8d809eaad9baac70548\"" Dec 13 16:05:13.653556 env[1196]: time="2024-12-13T16:05:13.653534016Z" level=info msg="StartContainer for \"86cf45a15dd4b1fd34be363adbd3e380cf0a75adb3afa8d809eaad9baac70548\"" Dec 13 16:05:13.663100 systemd[1]: Started cri-containerd-3ec61610d94d58517d57ca97938890141006f90115ecb25b583a70efa91b0690.scope. Dec 13 16:05:13.665107 env[1196]: time="2024-12-13T16:05:13.664746248Z" level=info msg="CreateContainer within sandbox \"15842d70b7b843c032c60afad29caaf516767808396f23ebc2dad8048fb94001\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ee0bb2541ca43046f3e92c1200953429a94b1f8f874a136774cef126ac1f2472\"" Dec 13 16:05:13.665409 env[1196]: time="2024-12-13T16:05:13.665387456Z" level=info msg="StartContainer for \"ee0bb2541ca43046f3e92c1200953429a94b1f8f874a136774cef126ac1f2472\"" Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.683000 audit: BPF prog-id=73 op=LOAD Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1718 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633631363130643934643538353137643537636139373933383839 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1718 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633631363130643934643538353137643537636139373933383839 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.684000 audit: BPF prog-id=74 op=LOAD Dec 13 16:05:13.684000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ea730 items=0 ppid=1718 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633631363130643934643538353137643537636139373933383839 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.685000 audit: BPF prog-id=75 op=LOAD Dec 13 16:05:13.685000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ea778 items=0 ppid=1718 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633631363130643934643538353137643537636139373933383839 Dec 13 16:05:13.686000 audit: BPF prog-id=75 op=UNLOAD Dec 13 16:05:13.686000 audit: BPF prog-id=74 op=UNLOAD Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.686000 audit: BPF prog-id=76 op=LOAD Dec 13 16:05:13.686000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001eab88 items=0 ppid=1718 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633631363130643934643538353137643537636139373933383839 Dec 13 16:05:13.697742 systemd[1]: Started cri-containerd-86cf45a15dd4b1fd34be363adbd3e380cf0a75adb3afa8d809eaad9baac70548.scope. Dec 13 16:05:13.721564 systemd[1]: Started cri-containerd-ee0bb2541ca43046f3e92c1200953429a94b1f8f874a136774cef126ac1f2472.scope. Dec 13 16:05:13.733816 kernel: kauditd_printk_skb: 447 callbacks suppressed Dec 13 16:05:13.734002 kernel: audit: type=1400 audit(1734105913.726:534): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734056 kernel: audit: type=1400 audit(1734105913.726:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.739403 kernel: audit: type=1400 audit(1734105913.726:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.747108 kernel: audit: type=1400 audit(1734105913.726:537): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.758715 kernel: audit: type=1400 audit(1734105913.726:538): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.758806 kernel: audit: type=1400 audit(1734105913.726:539): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.763154 kernel: audit: type=1400 audit(1734105913.726:540): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.766062 kernel: audit: type=1400 audit(1734105913.726:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.773290 kernel: audit: type=1400 audit(1734105913.726:542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.773338 kernel: audit: type=1400 audit(1734105913.729:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.730000 audit: BPF prog-id=77 op=LOAD Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1717 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636634356131356464346231666433346265333633616462643365 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1717 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636634356131356464346231666433346265333633616462643365 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.732000 audit: BPF prog-id=78 op=LOAD Dec 13 16:05:13.732000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b0a00 items=0 ppid=1717 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636634356131356464346231666433346265333633616462643365 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit: BPF prog-id=79 op=LOAD Dec 13 16:05:13.734000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b0a48 items=0 ppid=1717 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636634356131356464346231666433346265333633616462643365 Dec 13 16:05:13.734000 audit: BPF prog-id=79 op=UNLOAD Dec 13 16:05:13.734000 audit: BPF prog-id=78 op=UNLOAD Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.734000 audit: BPF prog-id=80 op=LOAD Dec 13 16:05:13.734000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0e58 items=0 ppid=1717 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636634356131356464346231666433346265333633616462643365 Dec 13 16:05:13.776213 env[1196]: time="2024-12-13T16:05:13.775842222Z" level=info msg="StartContainer for \"3ec61610d94d58517d57ca97938890141006f90115ecb25b583a70efa91b0690\" returns successfully" Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.791000 audit: BPF prog-id=81 op=LOAD Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1706 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565306262323534316361343330343666336539326331323030393533 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1706 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565306262323534316361343330343666336539326331323030393533 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.792000 audit: BPF prog-id=82 op=LOAD Dec 13 16:05:13.792000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d7ec0 items=0 ppid=1706 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565306262323534316361343330343666336539326331323030393533 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.793000 audit: BPF prog-id=83 op=LOAD Dec 13 16:05:13.793000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d7f08 items=0 ppid=1706 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565306262323534316361343330343666336539326331323030393533 Dec 13 16:05:13.794000 audit: BPF prog-id=83 op=UNLOAD Dec 13 16:05:13.794000 audit: BPF prog-id=82 op=UNLOAD Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:13.794000 audit: BPF prog-id=84 op=LOAD Dec 13 16:05:13.794000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003de318 items=0 ppid=1706 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565306262323534316361343330343666336539326331323030393533 Dec 13 16:05:13.803915 env[1196]: time="2024-12-13T16:05:13.803867913Z" level=info msg="StartContainer for \"86cf45a15dd4b1fd34be363adbd3e380cf0a75adb3afa8d809eaad9baac70548\" returns successfully" Dec 13 16:05:13.821434 kubelet[1663]: E1213 16:05:13.821389 1663 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.154:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3qt9m.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.154:6443: connect: connection refused" interval="1.6s" Dec 13 16:05:13.838014 env[1196]: time="2024-12-13T16:05:13.837958796Z" level=info msg="StartContainer for \"ee0bb2541ca43046f3e92c1200953429a94b1f8f874a136774cef126ac1f2472\" returns successfully" Dec 13 16:05:13.924815 kubelet[1663]: E1213 16:05:13.924686 1663 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.95.154:6443/api/v1/namespaces/default/events\": dial tcp 10.244.95.154:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-3qt9m.gb1.brightbox.com.1810c823bf5c7868 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-3qt9m.gb1.brightbox.com,UID:srv-3qt9m.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-3qt9m.gb1.brightbox.com,},FirstTimestamp:2024-12-13 16:05:12.397559912 +0000 UTC m=+0.569296324,LastTimestamp:2024-12-13 16:05:12.397559912 +0000 UTC m=+0.569296324,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-3qt9m.gb1.brightbox.com,}" Dec 13 16:05:13.988736 kubelet[1663]: W1213 16:05:13.988514 1663 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.95.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.154:6443: connect: connection refused Dec 13 16:05:13.988736 kubelet[1663]: E1213 16:05:13.988617 1663 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.95.154:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:14.018454 kubelet[1663]: I1213 16:05:14.018406 1663 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:14.018981 kubelet[1663]: E1213 16:05:14.018959 1663 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.244.95.154:6443/api/v1/nodes\": dial tcp 10.244.95.154:6443: connect: connection refused" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:14.429183 kubelet[1663]: E1213 16:05:14.429001 1663 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.95.154:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.95.154:6443: connect: connection refused" logger="UnhandledError" Dec 13 16:05:14.606000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:14.606000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d3a000 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:14.606000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:14.606000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002f0020 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:14.606000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:14.606000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:15.623131 kubelet[1663]: I1213 16:05:15.623084 1663 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:15.792000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.792000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004d0d830 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.792000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.794000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.794000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c004d0d8c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.798000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.798000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c005c3a620 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.799000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526355 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.799000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c004d0db00 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.799000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.818000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.818000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0047161c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.819000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:15.819000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c004e22b70 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:05:15.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:05:15.907309 kubelet[1663]: E1213 16:05:15.907185 1663 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-3qt9m.gb1.brightbox.com\" not found" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:16.002776 kubelet[1663]: I1213 16:05:16.002730 1663 kubelet_node_status.go:75] "Successfully registered node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:16.002776 kubelet[1663]: E1213 16:05:16.002770 1663 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"srv-3qt9m.gb1.brightbox.com\": node \"srv-3qt9m.gb1.brightbox.com\" not found" Dec 13 16:05:16.042417 kubelet[1663]: E1213 16:05:16.042356 1663 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-3qt9m.gb1.brightbox.com\" not found" Dec 13 16:05:16.392432 kubelet[1663]: I1213 16:05:16.392380 1663 apiserver.go:52] "Watching apiserver" Dec 13 16:05:16.405284 kubelet[1663]: E1213 16:05:16.405235 1663 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-srv-3qt9m.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:16.414602 kubelet[1663]: I1213 16:05:16.414567 1663 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 16:05:16.469353 kubelet[1663]: E1213 16:05:16.469295 1663 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:17.979000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526386 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 16:05:17.979000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d7c640 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:17.979000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:18.296972 systemd[1]: Reloading. Dec 13 16:05:18.413581 /usr/lib/systemd/system-generators/torcx-generator[1950]: time="2024-12-13T16:05:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 16:05:18.413608 /usr/lib/systemd/system-generators/torcx-generator[1950]: time="2024-12-13T16:05:18Z" level=info msg="torcx already run" Dec 13 16:05:18.475109 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 16:05:18.475125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 16:05:18.495053 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.574000 audit: BPF prog-id=85 op=LOAD Dec 13 16:05:18.574000 audit: BPF prog-id=69 op=UNLOAD Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit: BPF prog-id=86 op=LOAD Dec 13 16:05:18.575000 audit: BPF prog-id=46 op=UNLOAD Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.575000 audit: BPF prog-id=87 op=LOAD Dec 13 16:05:18.575000 audit: BPF prog-id=61 op=UNLOAD Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.576000 audit: BPF prog-id=88 op=LOAD Dec 13 16:05:18.576000 audit: BPF prog-id=81 op=UNLOAD Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.577000 audit: BPF prog-id=89 op=LOAD Dec 13 16:05:18.577000 audit: BPF prog-id=73 op=UNLOAD Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit: BPF prog-id=90 op=LOAD Dec 13 16:05:18.579000 audit: BPF prog-id=47 op=UNLOAD Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.579000 audit: BPF prog-id=91 op=LOAD Dec 13 16:05:18.579000 audit: BPF prog-id=48 op=UNLOAD Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.580000 audit: BPF prog-id=92 op=LOAD Dec 13 16:05:18.580000 audit: BPF prog-id=49 op=UNLOAD Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.581000 audit: BPF prog-id=93 op=LOAD Dec 13 16:05:18.581000 audit: BPF prog-id=65 op=UNLOAD Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit: BPF prog-id=94 op=LOAD Dec 13 16:05:18.582000 audit: BPF prog-id=50 op=UNLOAD Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit: BPF prog-id=95 op=LOAD Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.582000 audit: BPF prog-id=96 op=LOAD Dec 13 16:05:18.582000 audit: BPF prog-id=51 op=UNLOAD Dec 13 16:05:18.582000 audit: BPF prog-id=52 op=UNLOAD Dec 13 16:05:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit: BPF prog-id=97 op=LOAD Dec 13 16:05:18.585000 audit: BPF prog-id=53 op=UNLOAD Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit: BPF prog-id=98 op=LOAD Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.585000 audit: BPF prog-id=99 op=LOAD Dec 13 16:05:18.585000 audit: BPF prog-id=54 op=UNLOAD Dec 13 16:05:18.585000 audit: BPF prog-id=55 op=UNLOAD Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit: BPF prog-id=100 op=LOAD Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.586000 audit: BPF prog-id=101 op=LOAD Dec 13 16:05:18.586000 audit: BPF prog-id=56 op=UNLOAD Dec 13 16:05:18.586000 audit: BPF prog-id=57 op=UNLOAD Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit: BPF prog-id=102 op=LOAD Dec 13 16:05:18.588000 audit: BPF prog-id=77 op=UNLOAD Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit: BPF prog-id=103 op=LOAD Dec 13 16:05:18.588000 audit: BPF prog-id=58 op=UNLOAD Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit: BPF prog-id=104 op=LOAD Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:18.588000 audit: BPF prog-id=105 op=LOAD Dec 13 16:05:18.588000 audit: BPF prog-id=59 op=UNLOAD Dec 13 16:05:18.588000 audit: BPF prog-id=60 op=UNLOAD Dec 13 16:05:18.606663 systemd[1]: Stopping kubelet.service... Dec 13 16:05:18.635460 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 16:05:18.635748 systemd[1]: Stopped kubelet.service. Dec 13 16:05:18.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:18.640196 systemd[1]: Starting kubelet.service... Dec 13 16:05:19.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:19.613080 systemd[1]: Started kubelet.service. Dec 13 16:05:19.618793 kernel: kauditd_printk_skb: 376 callbacks suppressed Dec 13 16:05:19.618951 kernel: audit: type=1130 audit(1734105919.612:824): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:19.764177 kubelet[2001]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 16:05:19.764177 kubelet[2001]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 16:05:19.764177 kubelet[2001]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 16:05:19.764177 kubelet[2001]: I1213 16:05:19.763232 2001 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 16:05:19.772308 kubelet[2001]: I1213 16:05:19.772267 2001 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 16:05:19.772599 kubelet[2001]: I1213 16:05:19.772584 2001 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 16:05:19.773430 kubelet[2001]: I1213 16:05:19.773410 2001 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 16:05:19.780059 kubelet[2001]: I1213 16:05:19.780026 2001 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 16:05:19.792373 kubelet[2001]: I1213 16:05:19.792348 2001 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 16:05:19.796341 kubelet[2001]: E1213 16:05:19.796273 2001 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 16:05:19.796460 kubelet[2001]: I1213 16:05:19.796449 2001 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 16:05:19.801059 kubelet[2001]: I1213 16:05:19.801030 2001 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 16:05:19.801299 kubelet[2001]: I1213 16:05:19.801286 2001 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 16:05:19.801490 kubelet[2001]: I1213 16:05:19.801459 2001 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 16:05:19.801742 kubelet[2001]: I1213 16:05:19.801561 2001 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-3qt9m.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 16:05:19.801966 kubelet[2001]: I1213 16:05:19.801954 2001 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 16:05:19.802059 kubelet[2001]: I1213 16:05:19.802033 2001 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 16:05:19.802194 kubelet[2001]: I1213 16:05:19.802184 2001 state_mem.go:36] "Initialized new in-memory state store" Dec 13 16:05:19.802386 kubelet[2001]: I1213 16:05:19.802376 2001 kubelet.go:408] "Attempting to sync node with API server" Dec 13 16:05:19.802468 kubelet[2001]: I1213 16:05:19.802458 2001 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 16:05:19.802567 kubelet[2001]: I1213 16:05:19.802558 2001 kubelet.go:314] "Adding apiserver pod source" Dec 13 16:05:19.802656 kubelet[2001]: I1213 16:05:19.802647 2001 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 16:05:19.821381 kubelet[2001]: I1213 16:05:19.821358 2001 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 16:05:19.821981 kubelet[2001]: I1213 16:05:19.821964 2001 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 16:05:19.822544 kubelet[2001]: I1213 16:05:19.822530 2001 server.go:1269] "Started kubelet" Dec 13 16:05:19.852166 kernel: audit: type=1400 audit(1734105919.843:825): avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:19.852489 kernel: audit: type=1401 audit(1734105919.843:825): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:19.843000 audit[2001]: AVC avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:19.843000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:19.871757 kernel: audit: type=1300 audit(1734105919.843:825): arch=c000003e syscall=188 success=no exit=-22 a0=c000b47b90 a1=c000b5e9c0 a2=c000b47b60 a3=25 items=0 ppid=1 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:19.843000 audit[2001]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b47b90 a1=c000b5e9c0 a2=c000b47b60 a3=25 items=0 ppid=1 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:19.876166 kernel: audit: type=1327 audit(1734105919.843:825): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:19.843000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:19.885679 kubelet[2001]: I1213 16:05:19.885619 2001 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 16:05:19.887713 kubelet[2001]: I1213 16:05:19.887696 2001 server.go:460] "Adding debug handlers to kubelet server" Dec 13 16:05:19.903833 kubelet[2001]: I1213 16:05:19.890903 2001 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 16:05:19.920000 audit[2001]: AVC avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:19.926492 kubelet[2001]: E1213 16:05:19.923518 2001 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 16:05:19.926691 kubelet[2001]: I1213 16:05:19.926667 2001 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 16:05:19.926821 kubelet[2001]: I1213 16:05:19.926810 2001 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 16:05:19.927063 kernel: audit: type=1400 audit(1734105919.920:826): avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:19.920000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:19.929744 kubelet[2001]: I1213 16:05:19.904343 2001 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 16:05:19.929744 kubelet[2001]: I1213 16:05:19.928363 2001 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 16:05:19.929744 kubelet[2001]: I1213 16:05:19.928559 2001 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 16:05:19.930086 kernel: audit: type=1401 audit(1734105919.920:826): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:19.920000 audit[2001]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7e8e0 a1=c000884018 a2=c000c0c6c0 a3=25 items=0 ppid=1 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:19.937070 kernel: audit: type=1300 audit(1734105919.920:826): arch=c000003e syscall=188 success=no exit=-22 a0=c000b7e8e0 a1=c000884018 a2=c000c0c6c0 a3=25 items=0 ppid=1 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:19.920000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:19.945074 kernel: audit: type=1327 audit(1734105919.920:826): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:19.946368 kubelet[2001]: I1213 16:05:19.946352 2001 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 16:05:19.950395 kubelet[2001]: I1213 16:05:19.950372 2001 reconciler.go:26] "Reconciler: start to sync state" Dec 13 16:05:19.950860 kubelet[2001]: I1213 16:05:19.950825 2001 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 16:05:19.951447 kubelet[2001]: I1213 16:05:19.951431 2001 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 16:05:19.951968 kubelet[2001]: I1213 16:05:19.951952 2001 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 16:05:19.952121 kubelet[2001]: I1213 16:05:19.952111 2001 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 16:05:19.952234 kubelet[2001]: I1213 16:05:19.952222 2001 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 16:05:19.952341 kubelet[2001]: E1213 16:05:19.952326 2001 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 16:05:19.959695 kubelet[2001]: I1213 16:05:19.958888 2001 factory.go:221] Registration of the systemd container factory successfully Dec 13 16:05:19.960311 kubelet[2001]: I1213 16:05:19.960282 2001 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 16:05:19.968459 kubelet[2001]: I1213 16:05:19.968441 2001 factory.go:221] Registration of the containerd container factory successfully Dec 13 16:05:20.039609 kubelet[2001]: I1213 16:05:20.039586 2001 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 16:05:20.039818 kubelet[2001]: I1213 16:05:20.039800 2001 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 16:05:20.039892 kubelet[2001]: I1213 16:05:20.039884 2001 state_mem.go:36] "Initialized new in-memory state store" Dec 13 16:05:20.040129 kubelet[2001]: I1213 16:05:20.040116 2001 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 16:05:20.040222 kubelet[2001]: I1213 16:05:20.040200 2001 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 16:05:20.040294 kubelet[2001]: I1213 16:05:20.040286 2001 policy_none.go:49] "None policy: Start" Dec 13 16:05:20.040990 kubelet[2001]: I1213 16:05:20.040965 2001 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 16:05:20.040990 kubelet[2001]: I1213 16:05:20.040988 2001 state_mem.go:35] "Initializing new in-memory state store" Dec 13 16:05:20.041192 kubelet[2001]: I1213 16:05:20.041148 2001 state_mem.go:75] "Updated machine memory state" Dec 13 16:05:20.047437 kubelet[2001]: I1213 16:05:20.047420 2001 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 16:05:20.046000 audit[2001]: AVC avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:20.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 16:05:20.046000 audit[2001]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e15f50 a1=c000f11d88 a2=c000e15f20 a3=25 items=0 ppid=1 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:20.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 16:05:20.050838 kubelet[2001]: I1213 16:05:20.050820 2001 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 16:05:20.051082 kernel: audit: type=1400 audit(1734105920.046:827): avc: denied { mac_admin } for pid=2001 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:20.051182 kubelet[2001]: I1213 16:05:20.051168 2001 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 16:05:20.051296 kubelet[2001]: I1213 16:05:20.051250 2001 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 16:05:20.051759 kubelet[2001]: I1213 16:05:20.051744 2001 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 16:05:20.076059 kubelet[2001]: W1213 16:05:20.075944 2001 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 16:05:20.076536 kubelet[2001]: W1213 16:05:20.076522 2001 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 16:05:20.082111 kubelet[2001]: W1213 16:05:20.082093 2001 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 16:05:20.181103 kubelet[2001]: I1213 16:05:20.180908 2001 kubelet_node_status.go:72] "Attempting to register node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.194241 kubelet[2001]: I1213 16:05:20.194204 2001 kubelet_node_status.go:111] "Node was previously registered" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.194483 kubelet[2001]: I1213 16:05:20.194465 2001 kubelet_node_status.go:75] "Successfully registered node" node="srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.251630 kubelet[2001]: I1213 16:05:20.251562 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-flexvolume-dir\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.252268 kubelet[2001]: I1213 16:05:20.252205 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-k8s-certs\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.252689 kubelet[2001]: I1213 16:05:20.252564 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-kubeconfig\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.253105 kubelet[2001]: I1213 16:05:20.253007 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-ca-certs\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.253508 kubelet[2001]: I1213 16:05:20.253445 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-ca-certs\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.253816 kubelet[2001]: I1213 16:05:20.253754 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6c5822a137239f8bd53e38f7e6bf9c76-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-3qt9m.gb1.brightbox.com\" (UID: \"6c5822a137239f8bd53e38f7e6bf9c76\") " pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.254180 kubelet[2001]: I1213 16:05:20.254134 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/51a062d7b3b12a63ebbf081a5988d8fe-kubeconfig\") pod \"kube-scheduler-srv-3qt9m.gb1.brightbox.com\" (UID: \"51a062d7b3b12a63ebbf081a5988d8fe\") " pod="kube-system/kube-scheduler-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.254514 kubelet[2001]: I1213 16:05:20.254410 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-k8s-certs\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.254808 kubelet[2001]: I1213 16:05:20.254736 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf23034a0616a51988820481f034bf76-usr-share-ca-certificates\") pod \"kube-apiserver-srv-3qt9m.gb1.brightbox.com\" (UID: \"cf23034a0616a51988820481f034bf76\") " pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" Dec 13 16:05:20.804405 kubelet[2001]: I1213 16:05:20.804340 2001 apiserver.go:52] "Watching apiserver" Dec 13 16:05:20.852124 kubelet[2001]: I1213 16:05:20.852094 2001 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 16:05:21.124576 kubelet[2001]: I1213 16:05:21.124416 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-3qt9m.gb1.brightbox.com" podStartSLOduration=1.1243948559999999 podStartE2EDuration="1.124394856s" podCreationTimestamp="2024-12-13 16:05:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:05:21.048607171 +0000 UTC m=+1.412781763" watchObservedRunningTime="2024-12-13 16:05:21.124394856 +0000 UTC m=+1.488569469" Dec 13 16:05:21.184634 kubelet[2001]: I1213 16:05:21.184578 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-3qt9m.gb1.brightbox.com" podStartSLOduration=1.184557102 podStartE2EDuration="1.184557102s" podCreationTimestamp="2024-12-13 16:05:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:05:21.124386756 +0000 UTC m=+1.488561373" watchObservedRunningTime="2024-12-13 16:05:21.184557102 +0000 UTC m=+1.548731696" Dec 13 16:05:21.224663 kubelet[2001]: I1213 16:05:21.224569 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-3qt9m.gb1.brightbox.com" podStartSLOduration=1.224497947 podStartE2EDuration="1.224497947s" podCreationTimestamp="2024-12-13 16:05:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:05:21.186603143 +0000 UTC m=+1.550777746" watchObservedRunningTime="2024-12-13 16:05:21.224497947 +0000 UTC m=+1.588672540" Dec 13 16:05:21.650000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:21.650000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e76940 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:21.650000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:21.653000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:21.653000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e76980 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:21.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:21.654000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:21.654000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e76cc0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:21.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:21.655000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:05:21.655000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ebb560 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:05:21.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:05:22.497207 kubelet[2001]: I1213 16:05:22.497159 2001 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 16:05:22.497978 env[1196]: time="2024-12-13T16:05:22.497866146Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 16:05:22.498315 kubelet[2001]: I1213 16:05:22.498229 2001 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 16:05:22.861410 systemd[1]: Created slice kubepods-besteffort-pod102a07aa_6eab_4729_b860_cbf66679fc39.slice. Dec 13 16:05:22.873654 kubelet[2001]: I1213 16:05:22.873574 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/102a07aa-6eab-4729-b860-cbf66679fc39-xtables-lock\") pod \"kube-proxy-772hf\" (UID: \"102a07aa-6eab-4729-b860-cbf66679fc39\") " pod="kube-system/kube-proxy-772hf" Dec 13 16:05:22.873823 kubelet[2001]: I1213 16:05:22.873668 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72db4\" (UniqueName: \"kubernetes.io/projected/102a07aa-6eab-4729-b860-cbf66679fc39-kube-api-access-72db4\") pod \"kube-proxy-772hf\" (UID: \"102a07aa-6eab-4729-b860-cbf66679fc39\") " pod="kube-system/kube-proxy-772hf" Dec 13 16:05:22.873823 kubelet[2001]: I1213 16:05:22.873696 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/102a07aa-6eab-4729-b860-cbf66679fc39-kube-proxy\") pod \"kube-proxy-772hf\" (UID: \"102a07aa-6eab-4729-b860-cbf66679fc39\") " pod="kube-system/kube-proxy-772hf" Dec 13 16:05:22.873823 kubelet[2001]: I1213 16:05:22.873746 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/102a07aa-6eab-4729-b860-cbf66679fc39-lib-modules\") pod \"kube-proxy-772hf\" (UID: \"102a07aa-6eab-4729-b860-cbf66679fc39\") " pod="kube-system/kube-proxy-772hf" Dec 13 16:05:22.992209 kubelet[2001]: E1213 16:05:22.992164 2001 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 16:05:22.992209 kubelet[2001]: E1213 16:05:22.992217 2001 projected.go:194] Error preparing data for projected volume kube-api-access-72db4 for pod kube-system/kube-proxy-772hf: configmap "kube-root-ca.crt" not found Dec 13 16:05:22.992902 kubelet[2001]: E1213 16:05:22.992874 2001 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/102a07aa-6eab-4729-b860-cbf66679fc39-kube-api-access-72db4 podName:102a07aa-6eab-4729-b860-cbf66679fc39 nodeName:}" failed. No retries permitted until 2024-12-13 16:05:23.492279133 +0000 UTC m=+3.856453726 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-72db4" (UniqueName: "kubernetes.io/projected/102a07aa-6eab-4729-b860-cbf66679fc39-kube-api-access-72db4") pod "kube-proxy-772hf" (UID: "102a07aa-6eab-4729-b860-cbf66679fc39") : configmap "kube-root-ca.crt" not found Dec 13 16:05:23.566497 systemd[1]: Created slice kubepods-besteffort-pod6b8491da_fcc7_4291_895e_f20a5e583d8d.slice. Dec 13 16:05:23.579455 kubelet[2001]: I1213 16:05:23.579346 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6b8491da-fcc7-4291-895e-f20a5e583d8d-var-lib-calico\") pod \"tigera-operator-76c4976dd7-sbk55\" (UID: \"6b8491da-fcc7-4291-895e-f20a5e583d8d\") " pod="tigera-operator/tigera-operator-76c4976dd7-sbk55" Dec 13 16:05:23.580666 kubelet[2001]: I1213 16:05:23.580597 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tpz2h\" (UniqueName: \"kubernetes.io/projected/6b8491da-fcc7-4291-895e-f20a5e583d8d-kube-api-access-tpz2h\") pod \"tigera-operator-76c4976dd7-sbk55\" (UID: \"6b8491da-fcc7-4291-895e-f20a5e583d8d\") " pod="tigera-operator/tigera-operator-76c4976dd7-sbk55" Dec 13 16:05:23.582820 kubelet[2001]: I1213 16:05:23.582747 2001 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 16:05:23.773539 env[1196]: time="2024-12-13T16:05:23.773429220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-772hf,Uid:102a07aa-6eab-4729-b860-cbf66679fc39,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:23.799186 env[1196]: time="2024-12-13T16:05:23.799096780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:23.799430 env[1196]: time="2024-12-13T16:05:23.799161826Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:23.799539 env[1196]: time="2024-12-13T16:05:23.799504375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:23.799872 env[1196]: time="2024-12-13T16:05:23.799827088Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc pid=2067 runtime=io.containerd.runc.v2 Dec 13 16:05:23.825950 systemd[1]: Started cri-containerd-e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc.scope. Dec 13 16:05:23.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.844000 audit: BPF prog-id=106 op=LOAD Dec 13 16:05:23.845000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.845000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376135316331323332326161356565373933343664333436313235 Dec 13 16:05:23.845000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.845000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376135316331323332326161356565373933343664333436313235 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit: BPF prog-id=107 op=LOAD Dec 13 16:05:23.846000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032bd10 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376135316331323332326161356565373933343664333436313235 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.846000 audit: BPF prog-id=108 op=LOAD Dec 13 16:05:23.846000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032bd58 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376135316331323332326161356565373933343664333436313235 Dec 13 16:05:23.847000 audit: BPF prog-id=108 op=UNLOAD Dec 13 16:05:23.847000 audit: BPF prog-id=107 op=UNLOAD Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.847000 audit: BPF prog-id=109 op=LOAD Dec 13 16:05:23.847000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00037e168 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376135316331323332326161356565373933343664333436313235 Dec 13 16:05:23.861347 env[1196]: time="2024-12-13T16:05:23.861300408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-772hf,Uid:102a07aa-6eab-4729-b860-cbf66679fc39,Namespace:kube-system,Attempt:0,} returns sandbox id \"e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc\"" Dec 13 16:05:23.866449 env[1196]: time="2024-12-13T16:05:23.866407156Z" level=info msg="CreateContainer within sandbox \"e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 16:05:23.870207 env[1196]: time="2024-12-13T16:05:23.870180246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-sbk55,Uid:6b8491da-fcc7-4291-895e-f20a5e583d8d,Namespace:tigera-operator,Attempt:0,}" Dec 13 16:05:23.881393 env[1196]: time="2024-12-13T16:05:23.881357930Z" level=info msg="CreateContainer within sandbox \"e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5be1cc44a6bf664f00b16c42e63df60715dd22ad34a38d1ae9f94362d7f2edeb\"" Dec 13 16:05:23.882388 env[1196]: time="2024-12-13T16:05:23.882366414Z" level=info msg="StartContainer for \"5be1cc44a6bf664f00b16c42e63df60715dd22ad34a38d1ae9f94362d7f2edeb\"" Dec 13 16:05:23.886471 env[1196]: time="2024-12-13T16:05:23.886419060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:23.886643 env[1196]: time="2024-12-13T16:05:23.886616330Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:23.886750 env[1196]: time="2024-12-13T16:05:23.886726154Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:23.887023 env[1196]: time="2024-12-13T16:05:23.886990594Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19fd96a5e47a20acc1ae2195da2c2278a280964b5b160d04fd769edeb4d7b5d2 pid=2107 runtime=io.containerd.runc.v2 Dec 13 16:05:23.907469 systemd[1]: Started cri-containerd-5be1cc44a6bf664f00b16c42e63df60715dd22ad34a38d1ae9f94362d7f2edeb.scope. Dec 13 16:05:23.918177 systemd[1]: Started cri-containerd-19fd96a5e47a20acc1ae2195da2c2278a280964b5b160d04fd769edeb4d7b5d2.scope. Dec 13 16:05:23.937000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.937000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb1c1a982f8 items=0 ppid=2067 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562653163633434613662663636346630306231366334326536336466 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit: BPF prog-id=110 op=LOAD Dec 13 16:05:23.938000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024668 items=0 ppid=2067 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562653163633434613662663636346630306231366334326536336466 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.938000 audit: BPF prog-id=111 op=LOAD Dec 13 16:05:23.938000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000246b8 items=0 ppid=2067 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562653163633434613662663636346630306231366334326536336466 Dec 13 16:05:23.939000 audit: BPF prog-id=111 op=UNLOAD Dec 13 16:05:23.939000 audit: BPF prog-id=110 op=UNLOAD Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.939000 audit: BPF prog-id=112 op=LOAD Dec 13 16:05:23.939000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024748 items=0 ppid=2067 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562653163633434613662663636346630306231366334326536336466 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.942000 audit: BPF prog-id=113 op=LOAD Dec 13 16:05:23.943000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.943000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139666439366135653437613230616363316165323139356461326332 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139666439366135653437613230616363316165323139356461326332 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.944000 audit: BPF prog-id=114 op=LOAD Dec 13 16:05:23.944000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a3100 items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139666439366135653437613230616363316165323139356461326332 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.945000 audit: BPF prog-id=115 op=LOAD Dec 13 16:05:23.945000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a3148 items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139666439366135653437613230616363316165323139356461326332 Dec 13 16:05:23.946000 audit: BPF prog-id=115 op=UNLOAD Dec 13 16:05:23.946000 audit: BPF prog-id=114 op=UNLOAD Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:23.946000 audit: BPF prog-id=116 op=LOAD Dec 13 16:05:23.946000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a3558 items=0 ppid=2107 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:23.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139666439366135653437613230616363316165323139356461326332 Dec 13 16:05:23.974096 env[1196]: time="2024-12-13T16:05:23.974059943Z" level=info msg="StartContainer for \"5be1cc44a6bf664f00b16c42e63df60715dd22ad34a38d1ae9f94362d7f2edeb\" returns successfully" Dec 13 16:05:24.000675 env[1196]: time="2024-12-13T16:05:24.000633896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-sbk55,Uid:6b8491da-fcc7-4291-895e-f20a5e583d8d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"19fd96a5e47a20acc1ae2195da2c2278a280964b5b160d04fd769edeb4d7b5d2\"" Dec 13 16:05:24.002390 env[1196]: time="2024-12-13T16:05:24.002363248Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 16:05:24.286000 audit[2208]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.286000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6a46cfc0 a2=0 a3=7ffc6a46cfac items=0 ppid=2146 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 16:05:24.287000 audit[2209]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.287000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0ee3aff0 a2=0 a3=7ffd0ee3afdc items=0 ppid=2146 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 16:05:24.288000 audit[2210]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.288000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3a35e080 a2=0 a3=7ffc3a35e06c items=0 ppid=2146 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 16:05:24.289000 audit[2211]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.289000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce30c990 a2=0 a3=7ffdce30c97c items=0 ppid=2146 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 16:05:24.291000 audit[2212]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.291000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcf27ba90 a2=0 a3=7ffdcf27ba7c items=0 ppid=2146 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 16:05:24.292000 audit[2213]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.292000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc648bf010 a2=0 a3=7ffc648beffc items=0 ppid=2146 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 16:05:24.394000 audit[2214]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.394000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7335e0e0 a2=0 a3=7ffd7335e0cc items=0 ppid=2146 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 16:05:24.402000 audit[2216]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.402000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed41305f0 a2=0 a3=7ffed41305dc items=0 ppid=2146 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 16:05:24.407000 audit[2219]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.407000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd5647b7d0 a2=0 a3=7ffd5647b7bc items=0 ppid=2146 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 16:05:24.409000 audit[2220]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.409000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8845c910 a2=0 a3=7fff8845c8fc items=0 ppid=2146 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 16:05:24.413000 audit[2222]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.413000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccf2a09c0 a2=0 a3=7ffccf2a09ac items=0 ppid=2146 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 16:05:24.415000 audit[2223]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.415000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd9f192d0 a2=0 a3=7ffdd9f192bc items=0 ppid=2146 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 16:05:24.418000 audit[2225]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.418000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2237db00 a2=0 a3=7fff2237daec items=0 ppid=2146 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 16:05:24.423000 audit[2228]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.423000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed7bd4b10 a2=0 a3=7ffed7bd4afc items=0 ppid=2146 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 16:05:24.425000 audit[2229]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.425000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0a855c70 a2=0 a3=7fff0a855c5c items=0 ppid=2146 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 16:05:24.428000 audit[2231]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.428000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd74cd1c50 a2=0 a3=7ffd74cd1c3c items=0 ppid=2146 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 16:05:24.430000 audit[2232]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.430000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9c64e820 a2=0 a3=7ffc9c64e80c items=0 ppid=2146 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 16:05:24.434000 audit[2234]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.434000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8871c250 a2=0 a3=7ffd8871c23c items=0 ppid=2146 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 16:05:24.438000 audit[2237]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.438000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5d633c20 a2=0 a3=7ffd5d633c0c items=0 ppid=2146 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 16:05:24.442000 audit[2240]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.442000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe82c1eae0 a2=0 a3=7ffe82c1eacc items=0 ppid=2146 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 16:05:24.444000 audit[2241]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.444000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff78656020 a2=0 a3=7fff7865600c items=0 ppid=2146 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 16:05:24.447000 audit[2243]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.447000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcc3ca2d20 a2=0 a3=7ffcc3ca2d0c items=0 ppid=2146 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 16:05:24.452000 audit[2246]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.452000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd64d42680 a2=0 a3=7ffd64d4266c items=0 ppid=2146 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 16:05:24.453000 audit[2247]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.453000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf423aa40 a2=0 a3=7ffcf423aa2c items=0 ppid=2146 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 16:05:24.456000 audit[2249]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 16:05:24.456000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcd9065080 a2=0 a3=7ffcd906506c items=0 ppid=2146 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 16:05:24.486000 audit[2255]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:24.486000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd8294a4c0 a2=0 a3=7ffd8294a4ac items=0 ppid=2146 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:24.498000 audit[2255]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:24.498000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd8294a4c0 a2=0 a3=7ffd8294a4ac items=0 ppid=2146 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:24.500000 audit[2260]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.500000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6e8e8650 a2=0 a3=7ffc6e8e863c items=0 ppid=2146 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 16:05:24.503000 audit[2262]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.503000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe41466070 a2=0 a3=7ffe4146605c items=0 ppid=2146 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 16:05:24.508000 audit[2265]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.508000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef1e679b0 a2=0 a3=7ffef1e6799c items=0 ppid=2146 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 16:05:24.509000 audit[2266]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.509000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98b7d650 a2=0 a3=7ffe98b7d63c items=0 ppid=2146 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 16:05:24.512000 audit[2268]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.512000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6aad3f90 a2=0 a3=7ffd6aad3f7c items=0 ppid=2146 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 16:05:24.515000 audit[2269]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.515000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7cbe23a0 a2=0 a3=7ffe7cbe238c items=0 ppid=2146 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 16:05:24.523000 audit[2271]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.523000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6ed58d70 a2=0 a3=7ffe6ed58d5c items=0 ppid=2146 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 16:05:24.528000 audit[2274]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.528000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe832891f0 a2=0 a3=7ffe832891dc items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 16:05:24.530000 audit[2275]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.530000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd082c1700 a2=0 a3=7ffd082c16ec items=0 ppid=2146 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 16:05:24.534000 audit[2277]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.534000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb76f85e0 a2=0 a3=7ffcb76f85cc items=0 ppid=2146 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 16:05:24.535000 audit[2278]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.535000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3f1682d0 a2=0 a3=7fff3f1682bc items=0 ppid=2146 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 16:05:24.538000 audit[2280]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.538000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcaf77990 a2=0 a3=7fffcaf7797c items=0 ppid=2146 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 16:05:24.543000 audit[2283]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.543000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9596acd0 a2=0 a3=7fff9596acbc items=0 ppid=2146 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 16:05:24.548000 audit[2286]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.548000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff443eb490 a2=0 a3=7fff443eb47c items=0 ppid=2146 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 16:05:24.550000 audit[2287]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.550000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeabbdbbc0 a2=0 a3=7ffeabbdbbac items=0 ppid=2146 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 16:05:24.554000 audit[2289]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.554000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc7ce9a460 a2=0 a3=7ffc7ce9a44c items=0 ppid=2146 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 16:05:24.559000 audit[2292]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.559000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffca5c68400 a2=0 a3=7ffca5c683ec items=0 ppid=2146 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 16:05:24.561000 audit[2293]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.561000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeae41e370 a2=0 a3=7ffeae41e35c items=0 ppid=2146 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 16:05:24.567000 audit[2295]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.567000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc4122b2d0 a2=0 a3=7ffc4122b2bc items=0 ppid=2146 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 16:05:24.569000 audit[2296]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.569000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff97b52590 a2=0 a3=7fff97b5257c items=0 ppid=2146 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 16:05:24.574000 audit[2298]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.574000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeea7f6290 a2=0 a3=7ffeea7f627c items=0 ppid=2146 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 16:05:24.578000 audit[2301]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 16:05:24.578000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd0a26a50 a2=0 a3=7ffdd0a26a3c items=0 ppid=2146 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 16:05:24.585000 audit[2303]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 16:05:24.585000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe988e08e0 a2=0 a3=7ffe988e08cc items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.585000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:24.586000 audit[2303]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 16:05:24.586000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe988e08e0 a2=0 a3=7ffe988e08cc items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:24.586000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:24.602401 systemd[1]: run-containerd-runc-k8s.io-e37a51c12322aa5ee79346d34612550a09c5fa0fcc09e683d799c72b87664dbc-runc.v9Aeuj.mount: Deactivated successfully. Dec 13 16:05:25.410425 sudo[1389]: pam_unix(sudo:session): session closed for user root Dec 13 16:05:25.417665 kernel: kauditd_printk_skb: 325 callbacks suppressed Dec 13 16:05:25.417777 kernel: audit: type=1106 audit(1734105925.410:925): pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.410000 audit[1389]: USER_END pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.416000 audit[1389]: CRED_DISP pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.422461 kernel: audit: type=1104 audit(1734105925.416:926): pid=1389 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.563840 sshd[1386]: pam_unix(sshd:session): session closed for user core Dec 13 16:05:25.568000 audit[1386]: USER_END pid=1386 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:05:25.573134 systemd[1]: sshd@8-10.244.95.154:22-139.178.68.195:60464.service: Deactivated successfully. Dec 13 16:05:25.568000 audit[1386]: CRED_DISP pid=1386 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:05:25.579524 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 16:05:25.579714 systemd[1]: session-9.scope: Consumed 4.178s CPU time. Dec 13 16:05:25.584060 kernel: audit: type=1106 audit(1734105925.568:927): pid=1386 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:05:25.584111 kernel: audit: type=1104 audit(1734105925.568:928): pid=1386 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:05:25.584146 systemd-logind[1190]: Session 9 logged out. Waiting for processes to exit. Dec 13 16:05:25.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.154:22-139.178.68.195:60464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.588481 kernel: audit: type=1131 audit(1734105925.571:929): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.154:22-139.178.68.195:60464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:05:25.588798 systemd-logind[1190]: Removed session 9. Dec 13 16:05:26.461411 kubelet[2001]: I1213 16:05:26.461239 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-772hf" podStartSLOduration=4.461118281 podStartE2EDuration="4.461118281s" podCreationTimestamp="2024-12-13 16:05:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:05:24.019436861 +0000 UTC m=+4.383611574" watchObservedRunningTime="2024-12-13 16:05:26.461118281 +0000 UTC m=+6.825292937" Dec 13 16:05:28.714755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908980100.mount: Deactivated successfully. Dec 13 16:05:29.461315 env[1196]: time="2024-12-13T16:05:29.461118494Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:29.464200 env[1196]: time="2024-12-13T16:05:29.464145905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:29.466514 env[1196]: time="2024-12-13T16:05:29.466478208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:29.468833 env[1196]: time="2024-12-13T16:05:29.468771203Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:29.470353 env[1196]: time="2024-12-13T16:05:29.470285049Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 16:05:29.478947 env[1196]: time="2024-12-13T16:05:29.478417935Z" level=info msg="CreateContainer within sandbox \"19fd96a5e47a20acc1ae2195da2c2278a280964b5b160d04fd769edeb4d7b5d2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 16:05:29.503296 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3714169954.mount: Deactivated successfully. Dec 13 16:05:29.506715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1901970998.mount: Deactivated successfully. Dec 13 16:05:29.512611 env[1196]: time="2024-12-13T16:05:29.512517895Z" level=info msg="CreateContainer within sandbox \"19fd96a5e47a20acc1ae2195da2c2278a280964b5b160d04fd769edeb4d7b5d2\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"01b21990b1c13976c349de406d57a4333c592d55b7bdf6a107e5d9731a0c57dd\"" Dec 13 16:05:29.515573 env[1196]: time="2024-12-13T16:05:29.515530612Z" level=info msg="StartContainer for \"01b21990b1c13976c349de406d57a4333c592d55b7bdf6a107e5d9731a0c57dd\"" Dec 13 16:05:29.541322 systemd[1]: Started cri-containerd-01b21990b1c13976c349de406d57a4333c592d55b7bdf6a107e5d9731a0c57dd.scope. Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.572724 kernel: audit: type=1400 audit(1734105929.566:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.572838 kernel: audit: type=1400 audit(1734105929.566:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.572875 kernel: audit: type=1400 audit(1734105929.566:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.577923 kernel: audit: type=1400 audit(1734105929.566:933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.577999 kernel: audit: type=1400 audit(1734105929.566:934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit: BPF prog-id=117 op=LOAD Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2107 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:29.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623231393930623163313339373663333439646534303664353761 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2107 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:29.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623231393930623163313339373663333439646534303664353761 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.571000 audit: BPF prog-id=118 op=LOAD Dec 13 16:05:29.571000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df870 items=0 ppid=2107 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:29.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623231393930623163313339373663333439646534303664353761 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.574000 audit: BPF prog-id=119 op=LOAD Dec 13 16:05:29.574000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df8b8 items=0 ppid=2107 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:29.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623231393930623163313339373663333439646534303664353761 Dec 13 16:05:29.580000 audit: BPF prog-id=119 op=UNLOAD Dec 13 16:05:29.580000 audit: BPF prog-id=118 op=UNLOAD Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:29.580000 audit: BPF prog-id=120 op=LOAD Dec 13 16:05:29.580000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dfcc8 items=0 ppid=2107 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:29.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623231393930623163313339373663333439646534303664353761 Dec 13 16:05:29.599535 env[1196]: time="2024-12-13T16:05:29.596647336Z" level=info msg="StartContainer for \"01b21990b1c13976c349de406d57a4333c592d55b7bdf6a107e5d9731a0c57dd\" returns successfully" Dec 13 16:05:31.530516 kubelet[2001]: I1213 16:05:31.530448 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-sbk55" podStartSLOduration=3.058566929 podStartE2EDuration="8.530408275s" podCreationTimestamp="2024-12-13 16:05:23 +0000 UTC" firstStartedPulling="2024-12-13 16:05:24.001885023 +0000 UTC m=+4.366059617" lastFinishedPulling="2024-12-13 16:05:29.473726338 +0000 UTC m=+9.837900963" observedRunningTime="2024-12-13 16:05:30.046172466 +0000 UTC m=+10.410347183" watchObservedRunningTime="2024-12-13 16:05:31.530408275 +0000 UTC m=+11.894582888" Dec 13 16:05:32.808064 kernel: kauditd_printk_skb: 52 callbacks suppressed Dec 13 16:05:32.808257 kernel: audit: type=1325 audit(1734105932.805:948): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.805000 audit[2363]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.805000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeab3855e0 a2=0 a3=7ffeab3855cc items=0 ppid=2146 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.814436 kernel: audit: type=1300 audit(1734105932.805:948): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeab3855e0 a2=0 a3=7ffeab3855cc items=0 ppid=2146 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.816969 kernel: audit: type=1327 audit(1734105932.805:948): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.816000 audit[2363]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.821074 kernel: audit: type=1325 audit(1734105932.816:949): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.821150 kernel: audit: type=1300 audit(1734105932.816:949): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeab3855e0 a2=0 a3=0 items=0 ppid=2146 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.816000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeab3855e0 a2=0 a3=0 items=0 ppid=2146 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.827772 kernel: audit: type=1327 audit(1734105932.816:949): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.858000 audit[2365]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.862234 kernel: audit: type=1325 audit(1734105932.858:950): table=filter:91 family=2 entries=15 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.858000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc803bcbc0 a2=0 a3=7ffc803bcbac items=0 ppid=2146 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.890063 kernel: audit: type=1300 audit(1734105932.858:950): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc803bcbc0 a2=0 a3=7ffc803bcbac items=0 ppid=2146 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.892000 audit[2365]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.897432 kernel: audit: type=1327 audit(1734105932.858:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.897515 kernel: audit: type=1325 audit(1734105932.892:951): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:32.892000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc803bcbc0 a2=0 a3=0 items=0 ppid=2146 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:32.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:32.955294 systemd[1]: Created slice kubepods-besteffort-pod0a4f08e8_8f79_4771_abbe_47f84cbb1ddd.slice. Dec 13 16:05:32.960649 kubelet[2001]: W1213 16:05:32.960618 2001 reflector.go:561] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:srv-3qt9m.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object Dec 13 16:05:32.961330 kubelet[2001]: W1213 16:05:32.961016 2001 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:srv-3qt9m.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object Dec 13 16:05:32.961894 kubelet[2001]: E1213 16:05:32.961870 2001 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"typha-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"typha-certs\" is forbidden: User \"system:node:srv-3qt9m.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object" logger="UnhandledError" Dec 13 16:05:32.962008 kubelet[2001]: E1213 16:05:32.961967 2001 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"tigera-ca-bundle\" is forbidden: User \"system:node:srv-3qt9m.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object" logger="UnhandledError" Dec 13 16:05:32.962093 kubelet[2001]: W1213 16:05:32.961086 2001 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-3qt9m.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object Dec 13 16:05:32.962216 kubelet[2001]: E1213 16:05:32.962198 2001 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-3qt9m.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-3qt9m.gb1.brightbox.com' and this object" logger="UnhandledError" Dec 13 16:05:33.047767 kubelet[2001]: I1213 16:05:33.047708 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0a4f08e8-8f79-4771-abbe-47f84cbb1ddd-typha-certs\") pod \"calico-typha-7965969f77-rkm2z\" (UID: \"0a4f08e8-8f79-4771-abbe-47f84cbb1ddd\") " pod="calico-system/calico-typha-7965969f77-rkm2z" Dec 13 16:05:33.048208 kubelet[2001]: I1213 16:05:33.048169 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q8nv9\" (UniqueName: \"kubernetes.io/projected/0a4f08e8-8f79-4771-abbe-47f84cbb1ddd-kube-api-access-q8nv9\") pod \"calico-typha-7965969f77-rkm2z\" (UID: \"0a4f08e8-8f79-4771-abbe-47f84cbb1ddd\") " pod="calico-system/calico-typha-7965969f77-rkm2z" Dec 13 16:05:33.048421 kubelet[2001]: I1213 16:05:33.048398 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0a4f08e8-8f79-4771-abbe-47f84cbb1ddd-tigera-ca-bundle\") pod \"calico-typha-7965969f77-rkm2z\" (UID: \"0a4f08e8-8f79-4771-abbe-47f84cbb1ddd\") " pod="calico-system/calico-typha-7965969f77-rkm2z" Dec 13 16:05:33.068365 systemd[1]: Created slice kubepods-besteffort-poddcb533fd_1ddc_4f64_b0ea_f8a98791f21c.slice. Dec 13 16:05:33.149268 kubelet[2001]: I1213 16:05:33.149195 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-xtables-lock\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149454 kubelet[2001]: I1213 16:05:33.149303 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jfwjc\" (UniqueName: \"kubernetes.io/projected/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-kube-api-access-jfwjc\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149454 kubelet[2001]: I1213 16:05:33.149373 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-tigera-ca-bundle\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149454 kubelet[2001]: I1213 16:05:33.149424 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-cni-bin-dir\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149563 kubelet[2001]: I1213 16:05:33.149469 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-var-lib-calico\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149563 kubelet[2001]: I1213 16:05:33.149511 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-node-certs\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149628 kubelet[2001]: I1213 16:05:33.149557 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-var-run-calico\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149628 kubelet[2001]: I1213 16:05:33.149600 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-flexvol-driver-host\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149691 kubelet[2001]: I1213 16:05:33.149642 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-cni-net-dir\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149730 kubelet[2001]: I1213 16:05:33.149685 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-policysync\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149792 kubelet[2001]: I1213 16:05:33.149765 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-lib-modules\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.149854 kubelet[2001]: I1213 16:05:33.149813 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-cni-log-dir\") pod \"calico-node-md8mr\" (UID: \"dcb533fd-1ddc-4f64-b0ea-f8a98791f21c\") " pod="calico-system/calico-node-md8mr" Dec 13 16:05:33.194713 kubelet[2001]: E1213 16:05:33.194638 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:33.250906 kubelet[2001]: I1213 16:05:33.250831 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e-registration-dir\") pod \"csi-node-driver-f4j6p\" (UID: \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\") " pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:33.251105 kubelet[2001]: I1213 16:05:33.250990 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e-varrun\") pod \"csi-node-driver-f4j6p\" (UID: \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\") " pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:33.251105 kubelet[2001]: I1213 16:05:33.251015 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e-socket-dir\") pod \"csi-node-driver-f4j6p\" (UID: \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\") " pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:33.251220 kubelet[2001]: I1213 16:05:33.251124 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sb6ss\" (UniqueName: \"kubernetes.io/projected/7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e-kube-api-access-sb6ss\") pod \"csi-node-driver-f4j6p\" (UID: \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\") " pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:33.251220 kubelet[2001]: I1213 16:05:33.251210 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e-kubelet-dir\") pod \"csi-node-driver-f4j6p\" (UID: \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\") " pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:33.261666 kubelet[2001]: E1213 16:05:33.261619 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.261666 kubelet[2001]: W1213 16:05:33.261654 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.261870 kubelet[2001]: E1213 16:05:33.261702 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.352358 kubelet[2001]: E1213 16:05:33.352228 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.352606 kubelet[2001]: W1213 16:05:33.352585 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.352719 kubelet[2001]: E1213 16:05:33.352704 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.353046 kubelet[2001]: E1213 16:05:33.353024 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.353168 kubelet[2001]: W1213 16:05:33.353155 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.353244 kubelet[2001]: E1213 16:05:33.353230 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.353500 kubelet[2001]: E1213 16:05:33.353488 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.353598 kubelet[2001]: W1213 16:05:33.353586 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.353680 kubelet[2001]: E1213 16:05:33.353668 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.353934 kubelet[2001]: E1213 16:05:33.353921 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.354018 kubelet[2001]: W1213 16:05:33.354006 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.354117 kubelet[2001]: E1213 16:05:33.354096 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.354564 kubelet[2001]: E1213 16:05:33.354543 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.354564 kubelet[2001]: W1213 16:05:33.354562 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.354681 kubelet[2001]: E1213 16:05:33.354581 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.357163 kubelet[2001]: E1213 16:05:33.357128 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.357163 kubelet[2001]: W1213 16:05:33.357144 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.357163 kubelet[2001]: E1213 16:05:33.357163 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.357722 kubelet[2001]: E1213 16:05:33.357697 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.357722 kubelet[2001]: W1213 16:05:33.357716 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.357953 kubelet[2001]: E1213 16:05:33.357924 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.359526 kubelet[2001]: E1213 16:05:33.359496 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.359526 kubelet[2001]: W1213 16:05:33.359517 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.359816 kubelet[2001]: E1213 16:05:33.359783 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.360288 kubelet[2001]: E1213 16:05:33.360254 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.360288 kubelet[2001]: W1213 16:05:33.360269 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.360493 kubelet[2001]: E1213 16:05:33.360300 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.360932 kubelet[2001]: E1213 16:05:33.360907 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.360932 kubelet[2001]: W1213 16:05:33.360922 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.361202 kubelet[2001]: E1213 16:05:33.361175 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.362243 kubelet[2001]: E1213 16:05:33.362219 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.362423 kubelet[2001]: W1213 16:05:33.362400 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.362647 kubelet[2001]: E1213 16:05:33.362628 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.363103 kubelet[2001]: E1213 16:05:33.363085 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.363271 kubelet[2001]: W1213 16:05:33.363250 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.363469 kubelet[2001]: E1213 16:05:33.363444 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.363899 kubelet[2001]: E1213 16:05:33.363882 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.364022 kubelet[2001]: W1213 16:05:33.364001 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.364294 kubelet[2001]: E1213 16:05:33.364275 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.364647 kubelet[2001]: E1213 16:05:33.364630 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.364783 kubelet[2001]: W1213 16:05:33.364763 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.365004 kubelet[2001]: E1213 16:05:33.364986 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.365434 kubelet[2001]: E1213 16:05:33.365416 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.365583 kubelet[2001]: W1213 16:05:33.365563 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.365918 kubelet[2001]: E1213 16:05:33.365899 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.366244 kubelet[2001]: E1213 16:05:33.366233 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.366335 kubelet[2001]: W1213 16:05:33.366323 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.366468 kubelet[2001]: E1213 16:05:33.366458 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.366656 kubelet[2001]: E1213 16:05:33.366647 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.366723 kubelet[2001]: W1213 16:05:33.366712 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.366865 kubelet[2001]: E1213 16:05:33.366855 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.367087 kubelet[2001]: E1213 16:05:33.367077 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.367180 kubelet[2001]: W1213 16:05:33.367168 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.367328 kubelet[2001]: E1213 16:05:33.367317 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.367476 kubelet[2001]: E1213 16:05:33.367467 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.367539 kubelet[2001]: W1213 16:05:33.367529 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.367724 kubelet[2001]: E1213 16:05:33.367712 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.367973 kubelet[2001]: E1213 16:05:33.367964 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.368077 kubelet[2001]: W1213 16:05:33.368066 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.368175 kubelet[2001]: E1213 16:05:33.368164 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.368454 kubelet[2001]: E1213 16:05:33.368443 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.368536 kubelet[2001]: W1213 16:05:33.368525 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.368617 kubelet[2001]: E1213 16:05:33.368606 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.368927 kubelet[2001]: E1213 16:05:33.368917 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.369007 kubelet[2001]: W1213 16:05:33.368996 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.369106 kubelet[2001]: E1213 16:05:33.369095 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.370161 kubelet[2001]: E1213 16:05:33.370146 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.370254 kubelet[2001]: W1213 16:05:33.370241 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.370344 kubelet[2001]: E1213 16:05:33.370334 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.370630 kubelet[2001]: E1213 16:05:33.370619 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.370720 kubelet[2001]: W1213 16:05:33.370709 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.370800 kubelet[2001]: E1213 16:05:33.370790 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.371022 kubelet[2001]: E1213 16:05:33.371013 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.371153 kubelet[2001]: W1213 16:05:33.371141 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.371234 kubelet[2001]: E1213 16:05:33.371224 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.371715 kubelet[2001]: E1213 16:05:33.371702 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.371800 kubelet[2001]: W1213 16:05:33.371789 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.371883 kubelet[2001]: E1213 16:05:33.371873 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.372168 kubelet[2001]: E1213 16:05:33.372158 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.372254 kubelet[2001]: W1213 16:05:33.372243 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.372339 kubelet[2001]: E1213 16:05:33.372329 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.372638 kubelet[2001]: E1213 16:05:33.372628 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.372719 kubelet[2001]: W1213 16:05:33.372708 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.372792 kubelet[2001]: E1213 16:05:33.372782 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.373097 kubelet[2001]: E1213 16:05:33.373086 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.373204 kubelet[2001]: W1213 16:05:33.373192 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.373286 kubelet[2001]: E1213 16:05:33.373276 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.373769 kubelet[2001]: E1213 16:05:33.373758 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.373856 kubelet[2001]: W1213 16:05:33.373845 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.373934 kubelet[2001]: E1213 16:05:33.373923 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.469853 kubelet[2001]: E1213 16:05:33.469787 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.469853 kubelet[2001]: W1213 16:05:33.469832 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.470303 kubelet[2001]: E1213 16:05:33.469875 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.471009 kubelet[2001]: E1213 16:05:33.470978 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.471009 kubelet[2001]: W1213 16:05:33.471006 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.471254 kubelet[2001]: E1213 16:05:33.471056 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.471700 kubelet[2001]: E1213 16:05:33.471673 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.471796 kubelet[2001]: W1213 16:05:33.471699 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.471796 kubelet[2001]: E1213 16:05:33.471722 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.472205 kubelet[2001]: E1213 16:05:33.472179 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.472205 kubelet[2001]: W1213 16:05:33.472201 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.472369 kubelet[2001]: E1213 16:05:33.472225 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.472665 kubelet[2001]: E1213 16:05:33.472637 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.472665 kubelet[2001]: W1213 16:05:33.472658 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.472815 kubelet[2001]: E1213 16:05:33.472676 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.473174 kubelet[2001]: E1213 16:05:33.473088 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.473174 kubelet[2001]: W1213 16:05:33.473164 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.473325 kubelet[2001]: E1213 16:05:33.473186 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.575168 kubelet[2001]: E1213 16:05:33.574957 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.575168 kubelet[2001]: W1213 16:05:33.575068 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.575168 kubelet[2001]: E1213 16:05:33.575147 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.575792 kubelet[2001]: E1213 16:05:33.575663 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.575792 kubelet[2001]: W1213 16:05:33.575683 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.575792 kubelet[2001]: E1213 16:05:33.575704 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.576666 kubelet[2001]: E1213 16:05:33.576610 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.576666 kubelet[2001]: W1213 16:05:33.576644 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.576959 kubelet[2001]: E1213 16:05:33.576675 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.577265 kubelet[2001]: E1213 16:05:33.576963 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.577265 kubelet[2001]: W1213 16:05:33.576971 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.577265 kubelet[2001]: E1213 16:05:33.576981 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.577265 kubelet[2001]: E1213 16:05:33.577224 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.577265 kubelet[2001]: W1213 16:05:33.577232 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.577265 kubelet[2001]: E1213 16:05:33.577243 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.578107 kubelet[2001]: E1213 16:05:33.578073 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.578107 kubelet[2001]: W1213 16:05:33.578084 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.578107 kubelet[2001]: E1213 16:05:33.578094 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.679593 kubelet[2001]: E1213 16:05:33.679462 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.679785 kubelet[2001]: W1213 16:05:33.679766 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.679872 kubelet[2001]: E1213 16:05:33.679859 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.680234 kubelet[2001]: E1213 16:05:33.680220 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.680348 kubelet[2001]: W1213 16:05:33.680335 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.680427 kubelet[2001]: E1213 16:05:33.680415 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.682783 kubelet[2001]: E1213 16:05:33.682745 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.683007 kubelet[2001]: W1213 16:05:33.682988 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.683145 kubelet[2001]: E1213 16:05:33.683131 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.683569 kubelet[2001]: E1213 16:05:33.683556 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.683670 kubelet[2001]: W1213 16:05:33.683658 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.683761 kubelet[2001]: E1213 16:05:33.683750 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.684073 kubelet[2001]: E1213 16:05:33.684053 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.684187 kubelet[2001]: W1213 16:05:33.684174 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.684268 kubelet[2001]: E1213 16:05:33.684257 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.684535 kubelet[2001]: E1213 16:05:33.684525 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.684619 kubelet[2001]: W1213 16:05:33.684608 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.684706 kubelet[2001]: E1213 16:05:33.684695 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.786949 kubelet[2001]: E1213 16:05:33.786870 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.786949 kubelet[2001]: W1213 16:05:33.786924 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.787747 kubelet[2001]: E1213 16:05:33.786975 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.787747 kubelet[2001]: E1213 16:05:33.787537 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.787747 kubelet[2001]: W1213 16:05:33.787557 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.787747 kubelet[2001]: E1213 16:05:33.787580 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.788210 kubelet[2001]: E1213 16:05:33.787948 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.788210 kubelet[2001]: W1213 16:05:33.787966 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.788210 kubelet[2001]: E1213 16:05:33.787985 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.788495 kubelet[2001]: E1213 16:05:33.788403 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.788495 kubelet[2001]: W1213 16:05:33.788422 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.788495 kubelet[2001]: E1213 16:05:33.788442 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.788826 kubelet[2001]: E1213 16:05:33.788791 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.788826 kubelet[2001]: W1213 16:05:33.788821 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.789069 kubelet[2001]: E1213 16:05:33.788840 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.789281 kubelet[2001]: E1213 16:05:33.789245 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.789281 kubelet[2001]: W1213 16:05:33.789272 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.789498 kubelet[2001]: E1213 16:05:33.789293 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.890700 kubelet[2001]: E1213 16:05:33.890633 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.890700 kubelet[2001]: W1213 16:05:33.890682 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.891075 kubelet[2001]: E1213 16:05:33.890729 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.891368 kubelet[2001]: E1213 16:05:33.891343 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.891451 kubelet[2001]: W1213 16:05:33.891371 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.891451 kubelet[2001]: E1213 16:05:33.891404 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.891819 kubelet[2001]: E1213 16:05:33.891796 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.891902 kubelet[2001]: W1213 16:05:33.891824 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.891902 kubelet[2001]: E1213 16:05:33.891845 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.892351 kubelet[2001]: E1213 16:05:33.892326 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.892435 kubelet[2001]: W1213 16:05:33.892352 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.892435 kubelet[2001]: E1213 16:05:33.892375 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.892811 kubelet[2001]: E1213 16:05:33.892789 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.892880 kubelet[2001]: W1213 16:05:33.892812 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.892880 kubelet[2001]: E1213 16:05:33.892833 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.893207 kubelet[2001]: E1213 16:05:33.893189 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.893273 kubelet[2001]: W1213 16:05:33.893208 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.893273 kubelet[2001]: E1213 16:05:33.893222 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.909000 audit[2429]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:33.909000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdc3aff730 a2=0 a3=7ffdc3aff71c items=0 ppid=2146 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:33.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:33.914000 audit[2429]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:33.914000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc3aff730 a2=0 a3=0 items=0 ppid=2146 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:33.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:33.994910 kubelet[2001]: E1213 16:05:33.994869 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.995533 kubelet[2001]: W1213 16:05:33.995509 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.995650 kubelet[2001]: E1213 16:05:33.995635 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.995971 kubelet[2001]: E1213 16:05:33.995957 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.996067 kubelet[2001]: W1213 16:05:33.996055 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.996169 kubelet[2001]: E1213 16:05:33.996151 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.996605 kubelet[2001]: E1213 16:05:33.996592 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.996692 kubelet[2001]: W1213 16:05:33.996680 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.996761 kubelet[2001]: E1213 16:05:33.996750 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.997172 kubelet[2001]: E1213 16:05:33.997160 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.997263 kubelet[2001]: W1213 16:05:33.997251 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.997338 kubelet[2001]: E1213 16:05:33.997328 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.997616 kubelet[2001]: E1213 16:05:33.997605 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.997693 kubelet[2001]: W1213 16:05:33.997682 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.997771 kubelet[2001]: E1213 16:05:33.997758 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:33.998715 kubelet[2001]: E1213 16:05:33.998699 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:33.998809 kubelet[2001]: W1213 16:05:33.998796 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:33.998889 kubelet[2001]: E1213 16:05:33.998878 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.100010 kubelet[2001]: E1213 16:05:34.099961 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.100396 kubelet[2001]: W1213 16:05:34.100365 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.100550 kubelet[2001]: E1213 16:05:34.100525 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.101514 kubelet[2001]: E1213 16:05:34.101452 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.101891 kubelet[2001]: W1213 16:05:34.101837 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.103181 kubelet[2001]: E1213 16:05:34.103140 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.104389 kubelet[2001]: E1213 16:05:34.104357 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.104643 kubelet[2001]: W1213 16:05:34.104602 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.104823 kubelet[2001]: E1213 16:05:34.104794 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.107192 kubelet[2001]: E1213 16:05:34.107155 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.107473 kubelet[2001]: W1213 16:05:34.107439 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.107672 kubelet[2001]: E1213 16:05:34.107641 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.108338 kubelet[2001]: E1213 16:05:34.108311 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.108528 kubelet[2001]: W1213 16:05:34.108499 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.108753 kubelet[2001]: E1213 16:05:34.108724 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.109432 kubelet[2001]: E1213 16:05:34.109406 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.109661 kubelet[2001]: W1213 16:05:34.109631 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.109919 kubelet[2001]: E1213 16:05:34.109889 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.149812 kubelet[2001]: E1213 16:05:34.149776 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.149812 kubelet[2001]: W1213 16:05:34.149803 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.149993 kubelet[2001]: E1213 16:05:34.149831 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.150293 kubelet[2001]: E1213 16:05:34.150274 2001 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Dec 13 16:05:34.150467 kubelet[2001]: E1213 16:05:34.150453 2001 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/0a4f08e8-8f79-4771-abbe-47f84cbb1ddd-tigera-ca-bundle podName:0a4f08e8-8f79-4771-abbe-47f84cbb1ddd nodeName:}" failed. No retries permitted until 2024-12-13 16:05:34.650418064 +0000 UTC m=+15.014592721 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/0a4f08e8-8f79-4771-abbe-47f84cbb1ddd-tigera-ca-bundle") pod "calico-typha-7965969f77-rkm2z" (UID: "0a4f08e8-8f79-4771-abbe-47f84cbb1ddd") : failed to sync configmap cache: timed out waiting for the condition Dec 13 16:05:34.191155 kubelet[2001]: E1213 16:05:34.191053 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.191155 kubelet[2001]: W1213 16:05:34.191105 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.191481 kubelet[2001]: E1213 16:05:34.191196 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.193181 kubelet[2001]: E1213 16:05:34.193132 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.193181 kubelet[2001]: W1213 16:05:34.193154 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.193181 kubelet[2001]: E1213 16:05:34.193170 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.212672 kubelet[2001]: E1213 16:05:34.212647 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.212837 kubelet[2001]: W1213 16:05:34.212820 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.212935 kubelet[2001]: E1213 16:05:34.212922 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.213222 kubelet[2001]: E1213 16:05:34.213209 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.213310 kubelet[2001]: W1213 16:05:34.213298 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.213393 kubelet[2001]: E1213 16:05:34.213382 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.213610 kubelet[2001]: E1213 16:05:34.213585 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.213610 kubelet[2001]: W1213 16:05:34.213603 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.213708 kubelet[2001]: E1213 16:05:34.213622 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.213862 kubelet[2001]: E1213 16:05:34.213851 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.213862 kubelet[2001]: W1213 16:05:34.213861 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.213946 kubelet[2001]: E1213 16:05:34.213870 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.253016 kubelet[2001]: E1213 16:05:34.252812 2001 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Dec 13 16:05:34.253016 kubelet[2001]: E1213 16:05:34.252903 2001 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-tigera-ca-bundle podName:dcb533fd-1ddc-4f64-b0ea-f8a98791f21c nodeName:}" failed. No retries permitted until 2024-12-13 16:05:34.752880873 +0000 UTC m=+15.117055466 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/dcb533fd-1ddc-4f64-b0ea-f8a98791f21c-tigera-ca-bundle") pod "calico-node-md8mr" (UID: "dcb533fd-1ddc-4f64-b0ea-f8a98791f21c") : failed to sync configmap cache: timed out waiting for the condition Dec 13 16:05:34.315337 kubelet[2001]: E1213 16:05:34.315276 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.315337 kubelet[2001]: W1213 16:05:34.315314 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.315337 kubelet[2001]: E1213 16:05:34.315354 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.315804 kubelet[2001]: E1213 16:05:34.315723 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.315804 kubelet[2001]: W1213 16:05:34.315737 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.315804 kubelet[2001]: E1213 16:05:34.315754 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.416845 kubelet[2001]: E1213 16:05:34.416788 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.416845 kubelet[2001]: W1213 16:05:34.416835 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.417194 kubelet[2001]: E1213 16:05:34.416869 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.417257 kubelet[2001]: E1213 16:05:34.417203 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.417257 kubelet[2001]: W1213 16:05:34.417215 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.417257 kubelet[2001]: E1213 16:05:34.417228 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.519108 kubelet[2001]: E1213 16:05:34.518944 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.519369 kubelet[2001]: W1213 16:05:34.519341 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.519532 kubelet[2001]: E1213 16:05:34.519513 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.519985 kubelet[2001]: E1213 16:05:34.519969 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.520108 kubelet[2001]: W1213 16:05:34.520092 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.520252 kubelet[2001]: E1213 16:05:34.520233 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.621619 kubelet[2001]: E1213 16:05:34.621583 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.621619 kubelet[2001]: W1213 16:05:34.621609 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.621851 kubelet[2001]: E1213 16:05:34.621637 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.621964 kubelet[2001]: E1213 16:05:34.621952 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.622009 kubelet[2001]: W1213 16:05:34.621964 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.622009 kubelet[2001]: E1213 16:05:34.621974 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.723744 kubelet[2001]: E1213 16:05:34.723683 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.723744 kubelet[2001]: W1213 16:05:34.723717 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.723744 kubelet[2001]: E1213 16:05:34.723744 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.724408 kubelet[2001]: E1213 16:05:34.724025 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.724408 kubelet[2001]: W1213 16:05:34.724034 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.724408 kubelet[2001]: E1213 16:05:34.724066 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.724408 kubelet[2001]: E1213 16:05:34.724308 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.724408 kubelet[2001]: W1213 16:05:34.724318 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.724408 kubelet[2001]: E1213 16:05:34.724328 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.724917 kubelet[2001]: E1213 16:05:34.724525 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.724917 kubelet[2001]: W1213 16:05:34.724534 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.724917 kubelet[2001]: E1213 16:05:34.724545 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.724917 kubelet[2001]: E1213 16:05:34.724700 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.724917 kubelet[2001]: W1213 16:05:34.724708 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.724917 kubelet[2001]: E1213 16:05:34.724718 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.724917 kubelet[2001]: E1213 16:05:34.724911 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.724917 kubelet[2001]: W1213 16:05:34.724919 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.725629 kubelet[2001]: E1213 16:05:34.724928 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.726480 kubelet[2001]: E1213 16:05:34.726452 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.726480 kubelet[2001]: W1213 16:05:34.726470 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.726480 kubelet[2001]: E1213 16:05:34.726487 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.762325 env[1196]: time="2024-12-13T16:05:34.762255830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7965969f77-rkm2z,Uid:0a4f08e8-8f79-4771-abbe-47f84cbb1ddd,Namespace:calico-system,Attempt:0,}" Dec 13 16:05:34.790549 env[1196]: time="2024-12-13T16:05:34.790330577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:34.790549 env[1196]: time="2024-12-13T16:05:34.790424279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:34.791969 env[1196]: time="2024-12-13T16:05:34.790779787Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:34.794229 env[1196]: time="2024-12-13T16:05:34.794111710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c16b6b69c55ec42f9f9255b310684f388fde38ee7795870e0b630af5a6a4612 pid=2476 runtime=io.containerd.runc.v2 Dec 13 16:05:34.826150 systemd[1]: Started cri-containerd-8c16b6b69c55ec42f9f9255b310684f388fde38ee7795870e0b630af5a6a4612.scope. Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.826950 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.830963 kubelet[2001]: W1213 16:05:34.826969 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.826992 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.827238 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.830963 kubelet[2001]: W1213 16:05:34.827247 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.827257 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.827414 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.830963 kubelet[2001]: W1213 16:05:34.827422 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.827431 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.830963 kubelet[2001]: E1213 16:05:34.827584 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.831340 kubelet[2001]: W1213 16:05:34.827592 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.831340 kubelet[2001]: E1213 16:05:34.827601 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.831340 kubelet[2001]: E1213 16:05:34.827773 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.831340 kubelet[2001]: W1213 16:05:34.827782 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.831340 kubelet[2001]: E1213 16:05:34.827790 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.831340 kubelet[2001]: E1213 16:05:34.828964 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:34.831340 kubelet[2001]: W1213 16:05:34.828975 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:34.831340 kubelet[2001]: E1213 16:05:34.828992 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.855000 audit: BPF prog-id=121 op=LOAD Dec 13 16:05:34.855000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.855000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:34.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313662366236396335356563343266396639323535623331303638 Dec 13 16:05:34.855000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.855000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:34.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313662366236396335356563343266396639323535623331303638 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit: BPF prog-id=122 op=LOAD Dec 13 16:05:34.856000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:34.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313662366236396335356563343266396639323535623331303638 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit: BPF prog-id=123 op=LOAD Dec 13 16:05:34.856000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:34.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313662366236396335356563343266396639323535623331303638 Dec 13 16:05:34.856000 audit: BPF prog-id=123 op=UNLOAD Dec 13 16:05:34.856000 audit: BPF prog-id=122 op=UNLOAD Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:34.856000 audit: BPF prog-id=124 op=LOAD Dec 13 16:05:34.856000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da138 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:34.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313662366236396335356563343266396639323535623331303638 Dec 13 16:05:34.873797 env[1196]: time="2024-12-13T16:05:34.873738553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-md8mr,Uid:dcb533fd-1ddc-4f64-b0ea-f8a98791f21c,Namespace:calico-system,Attempt:0,}" Dec 13 16:05:34.894643 env[1196]: time="2024-12-13T16:05:34.894593313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7965969f77-rkm2z,Uid:0a4f08e8-8f79-4771-abbe-47f84cbb1ddd,Namespace:calico-system,Attempt:0,} returns sandbox id \"8c16b6b69c55ec42f9f9255b310684f388fde38ee7795870e0b630af5a6a4612\"" Dec 13 16:05:34.897206 env[1196]: time="2024-12-13T16:05:34.896456397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 16:05:34.954170 kubelet[2001]: E1213 16:05:34.953782 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:34.989136 env[1196]: time="2024-12-13T16:05:34.989021262Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:05:34.989376 env[1196]: time="2024-12-13T16:05:34.989349913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:05:34.989475 env[1196]: time="2024-12-13T16:05:34.989453282Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:05:34.989801 env[1196]: time="2024-12-13T16:05:34.989752624Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a pid=2522 runtime=io.containerd.runc.v2 Dec 13 16:05:35.012282 systemd[1]: Started cri-containerd-6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a.scope. Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.037000 audit: BPF prog-id=125 op=LOAD Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:35.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383366396338326633373563353162323736343165666165323535 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:35.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383366396338326633373563353162323736343165666165323535 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit: BPF prog-id=126 op=LOAD Dec 13 16:05:35.039000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000d1cd0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:35.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383366396338326633373563353162323736343165666165323535 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.039000 audit: BPF prog-id=127 op=LOAD Dec 13 16:05:35.039000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000d1d18 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:35.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383366396338326633373563353162323736343165666165323535 Dec 13 16:05:35.040000 audit: BPF prog-id=127 op=UNLOAD Dec 13 16:05:35.040000 audit: BPF prog-id=126 op=UNLOAD Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:35.040000 audit: BPF prog-id=128 op=LOAD Dec 13 16:05:35.040000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003be128 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:35.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383366396338326633373563353162323736343165666165323535 Dec 13 16:05:35.060368 env[1196]: time="2024-12-13T16:05:35.060301486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-md8mr,Uid:dcb533fd-1ddc-4f64-b0ea-f8a98791f21c,Namespace:calico-system,Attempt:0,} returns sandbox id \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\"" Dec 13 16:05:36.577065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1945694722.mount: Deactivated successfully. Dec 13 16:05:36.955131 kubelet[2001]: E1213 16:05:36.954160 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:38.308133 env[1196]: time="2024-12-13T16:05:38.308028030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:38.309869 env[1196]: time="2024-12-13T16:05:38.309803243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:38.312645 env[1196]: time="2024-12-13T16:05:38.312580816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:38.316308 env[1196]: time="2024-12-13T16:05:38.316245398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:38.317406 env[1196]: time="2024-12-13T16:05:38.317362243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 16:05:38.329478 env[1196]: time="2024-12-13T16:05:38.329396813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 16:05:38.371824 env[1196]: time="2024-12-13T16:05:38.371771772Z" level=info msg="CreateContainer within sandbox \"8c16b6b69c55ec42f9f9255b310684f388fde38ee7795870e0b630af5a6a4612\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 16:05:38.382620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount936853303.mount: Deactivated successfully. Dec 13 16:05:38.386230 env[1196]: time="2024-12-13T16:05:38.386184038Z" level=info msg="CreateContainer within sandbox \"8c16b6b69c55ec42f9f9255b310684f388fde38ee7795870e0b630af5a6a4612\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"05e67cf292e464492132e1114863e41de3058d91212ae7d6d6f7a82654bff92f\"" Dec 13 16:05:38.386811 env[1196]: time="2024-12-13T16:05:38.386779463Z" level=info msg="StartContainer for \"05e67cf292e464492132e1114863e41de3058d91212ae7d6d6f7a82654bff92f\"" Dec 13 16:05:38.428702 systemd[1]: Started cri-containerd-05e67cf292e464492132e1114863e41de3058d91212ae7d6d6f7a82654bff92f.scope. Dec 13 16:05:38.464088 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 16:05:38.464320 kernel: audit: type=1400 audit(1734105938.458:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.464370 kernel: audit: type=1400 audit(1734105938.458:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.470071 kernel: audit: type=1400 audit(1734105938.458:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.474154 kernel: audit: type=1400 audit(1734105938.458:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.478117 kernel: audit: type=1400 audit(1734105938.458:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.484694 kernel: audit: type=1400 audit(1734105938.458:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.484770 kernel: audit: type=1400 audit(1734105938.458:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.490223 kernel: audit: type=1400 audit(1734105938.458:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.498057 kernel: audit: type=1400 audit(1734105938.458:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.502062 kernel: audit: type=1400 audit(1734105938.461:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.461000 audit: BPF prog-id=129 op=LOAD Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2476 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653637636632393265343634343932313332653131313438363365 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2476 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653637636632393265343634343932313332653131313438363365 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit: BPF prog-id=130 op=LOAD Dec 13 16:05:38.465000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029be20 items=0 ppid=2476 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653637636632393265343634343932313332653131313438363365 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit: BPF prog-id=131 op=LOAD Dec 13 16:05:38.465000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029be68 items=0 ppid=2476 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653637636632393265343634343932313332653131313438363365 Dec 13 16:05:38.465000 audit: BPF prog-id=131 op=UNLOAD Dec 13 16:05:38.465000 audit: BPF prog-id=130 op=UNLOAD Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:38.465000 audit: BPF prog-id=132 op=LOAD Dec 13 16:05:38.465000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002e6278 items=0 ppid=2476 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035653637636632393265343634343932313332653131313438363365 Dec 13 16:05:38.538077 env[1196]: time="2024-12-13T16:05:38.537128402Z" level=info msg="StartContainer for \"05e67cf292e464492132e1114863e41de3058d91212ae7d6d6f7a82654bff92f\" returns successfully" Dec 13 16:05:38.957331 kubelet[2001]: E1213 16:05:38.957170 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:39.083536 kubelet[2001]: I1213 16:05:39.083469 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7965969f77-rkm2z" podStartSLOduration=3.650667553 podStartE2EDuration="7.083441429s" podCreationTimestamp="2024-12-13 16:05:32 +0000 UTC" firstStartedPulling="2024-12-13 16:05:34.895838073 +0000 UTC m=+15.260012666" lastFinishedPulling="2024-12-13 16:05:38.328611946 +0000 UTC m=+18.692786542" observedRunningTime="2024-12-13 16:05:39.083023661 +0000 UTC m=+19.447198299" watchObservedRunningTime="2024-12-13 16:05:39.083441429 +0000 UTC m=+19.447616051" Dec 13 16:05:39.098190 kubelet[2001]: E1213 16:05:39.098140 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.098190 kubelet[2001]: W1213 16:05:39.098184 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.098384 kubelet[2001]: E1213 16:05:39.098220 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.098511 kubelet[2001]: E1213 16:05:39.098497 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.098565 kubelet[2001]: W1213 16:05:39.098511 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.098565 kubelet[2001]: E1213 16:05:39.098524 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.098758 kubelet[2001]: E1213 16:05:39.098745 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.098806 kubelet[2001]: W1213 16:05:39.098758 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.098806 kubelet[2001]: E1213 16:05:39.098770 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.098988 kubelet[2001]: E1213 16:05:39.098976 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.099044 kubelet[2001]: W1213 16:05:39.098989 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.099044 kubelet[2001]: E1213 16:05:39.099018 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.099269 kubelet[2001]: E1213 16:05:39.099255 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.099316 kubelet[2001]: W1213 16:05:39.099270 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.099316 kubelet[2001]: E1213 16:05:39.099282 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.099485 kubelet[2001]: E1213 16:05:39.099473 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.099533 kubelet[2001]: W1213 16:05:39.099486 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.099533 kubelet[2001]: E1213 16:05:39.099498 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.099699 kubelet[2001]: E1213 16:05:39.099687 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.099748 kubelet[2001]: W1213 16:05:39.099699 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.099748 kubelet[2001]: E1213 16:05:39.099710 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.100521 kubelet[2001]: E1213 16:05:39.100498 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.100521 kubelet[2001]: W1213 16:05:39.100518 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.100614 kubelet[2001]: E1213 16:05:39.100534 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.100780 kubelet[2001]: E1213 16:05:39.100767 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.100836 kubelet[2001]: W1213 16:05:39.100781 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.100836 kubelet[2001]: E1213 16:05:39.100793 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.100994 kubelet[2001]: E1213 16:05:39.100981 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.101067 kubelet[2001]: W1213 16:05:39.100994 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.101067 kubelet[2001]: E1213 16:05:39.101005 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.101251 kubelet[2001]: E1213 16:05:39.101238 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.101298 kubelet[2001]: W1213 16:05:39.101253 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.101298 kubelet[2001]: E1213 16:05:39.101265 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.101475 kubelet[2001]: E1213 16:05:39.101462 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.101525 kubelet[2001]: W1213 16:05:39.101477 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.101525 kubelet[2001]: E1213 16:05:39.101487 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.101714 kubelet[2001]: E1213 16:05:39.101701 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.101761 kubelet[2001]: W1213 16:05:39.101714 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.101761 kubelet[2001]: E1213 16:05:39.101724 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.101944 kubelet[2001]: E1213 16:05:39.101932 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.102002 kubelet[2001]: W1213 16:05:39.101945 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.102002 kubelet[2001]: E1213 16:05:39.101955 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.102196 kubelet[2001]: E1213 16:05:39.102182 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.102196 kubelet[2001]: W1213 16:05:39.102195 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.102287 kubelet[2001]: E1213 16:05:39.102206 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.172193 kubelet[2001]: E1213 16:05:39.172145 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.172836 kubelet[2001]: W1213 16:05:39.172796 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.173148 kubelet[2001]: E1213 16:05:39.173023 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.174281 kubelet[2001]: E1213 16:05:39.174248 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.174521 kubelet[2001]: W1213 16:05:39.174489 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.174728 kubelet[2001]: E1213 16:05:39.174699 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.175574 kubelet[2001]: E1213 16:05:39.175530 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.175796 kubelet[2001]: W1213 16:05:39.175764 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.176014 kubelet[2001]: E1213 16:05:39.175987 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.176665 kubelet[2001]: E1213 16:05:39.176611 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.176665 kubelet[2001]: W1213 16:05:39.176655 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.176932 kubelet[2001]: E1213 16:05:39.176700 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.178453 kubelet[2001]: E1213 16:05:39.178370 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.178453 kubelet[2001]: W1213 16:05:39.178407 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.178641 kubelet[2001]: E1213 16:05:39.178625 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.180017 kubelet[2001]: E1213 16:05:39.179093 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.180017 kubelet[2001]: W1213 16:05:39.179132 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.180017 kubelet[2001]: E1213 16:05:39.179290 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.180017 kubelet[2001]: E1213 16:05:39.179639 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.180017 kubelet[2001]: W1213 16:05:39.179656 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.180017 kubelet[2001]: E1213 16:05:39.179785 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.180134 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.182944 kubelet[2001]: W1213 16:05:39.180151 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.180295 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.180524 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.182944 kubelet[2001]: W1213 16:05:39.180540 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.180588 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.180959 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.182944 kubelet[2001]: W1213 16:05:39.180977 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.181003 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.182944 kubelet[2001]: E1213 16:05:39.181499 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.183544 kubelet[2001]: W1213 16:05:39.181518 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.183544 kubelet[2001]: E1213 16:05:39.181650 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.183544 kubelet[2001]: E1213 16:05:39.182927 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.183544 kubelet[2001]: W1213 16:05:39.182949 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.183544 kubelet[2001]: E1213 16:05:39.183165 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.183544 kubelet[2001]: E1213 16:05:39.183509 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.183544 kubelet[2001]: W1213 16:05:39.183527 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.184172 kubelet[2001]: E1213 16:05:39.183688 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.184172 kubelet[2001]: E1213 16:05:39.183979 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.184172 kubelet[2001]: W1213 16:05:39.183996 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.184172 kubelet[2001]: E1213 16:05:39.184025 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.184805 kubelet[2001]: E1213 16:05:39.184781 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.184884 kubelet[2001]: W1213 16:05:39.184812 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.184884 kubelet[2001]: E1213 16:05:39.184846 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.185392 kubelet[2001]: E1213 16:05:39.185372 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.185530 kubelet[2001]: W1213 16:05:39.185511 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.185653 kubelet[2001]: E1213 16:05:39.185636 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.186183 kubelet[2001]: E1213 16:05:39.186166 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.186313 kubelet[2001]: W1213 16:05:39.186295 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.186452 kubelet[2001]: E1213 16:05:39.186434 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:39.186848 kubelet[2001]: E1213 16:05:39.186824 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:39.186931 kubelet[2001]: W1213 16:05:39.186849 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:39.186931 kubelet[2001]: E1213 16:05:39.186871 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.066998 kubelet[2001]: I1213 16:05:40.066938 2001 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 16:05:40.114295 kubelet[2001]: E1213 16:05:40.114235 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.114295 kubelet[2001]: W1213 16:05:40.114281 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.114676 kubelet[2001]: E1213 16:05:40.114324 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.114841 kubelet[2001]: E1213 16:05:40.114783 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.114841 kubelet[2001]: W1213 16:05:40.114811 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.114841 kubelet[2001]: E1213 16:05:40.114835 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.115355 kubelet[2001]: E1213 16:05:40.115323 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.115355 kubelet[2001]: W1213 16:05:40.115349 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.115569 kubelet[2001]: E1213 16:05:40.115371 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.115841 kubelet[2001]: E1213 16:05:40.115808 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.115841 kubelet[2001]: W1213 16:05:40.115834 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.116116 kubelet[2001]: E1213 16:05:40.115855 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.116382 kubelet[2001]: E1213 16:05:40.116348 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.116382 kubelet[2001]: W1213 16:05:40.116374 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.116655 kubelet[2001]: E1213 16:05:40.116395 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.116846 kubelet[2001]: E1213 16:05:40.116777 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.116846 kubelet[2001]: W1213 16:05:40.116798 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.116846 kubelet[2001]: E1213 16:05:40.116812 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.117375 kubelet[2001]: E1213 16:05:40.117134 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.117375 kubelet[2001]: W1213 16:05:40.117148 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.117375 kubelet[2001]: E1213 16:05:40.117163 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.117623 kubelet[2001]: E1213 16:05:40.117448 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.117623 kubelet[2001]: W1213 16:05:40.117460 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.117623 kubelet[2001]: E1213 16:05:40.117474 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.117884 kubelet[2001]: E1213 16:05:40.117795 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.117884 kubelet[2001]: W1213 16:05:40.117808 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.117884 kubelet[2001]: E1213 16:05:40.117823 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.118167 kubelet[2001]: E1213 16:05:40.118146 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.118167 kubelet[2001]: W1213 16:05:40.118159 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.118342 kubelet[2001]: E1213 16:05:40.118176 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.118646 kubelet[2001]: E1213 16:05:40.118431 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.118646 kubelet[2001]: W1213 16:05:40.118443 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.118646 kubelet[2001]: E1213 16:05:40.118456 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.118916 kubelet[2001]: E1213 16:05:40.118769 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.118916 kubelet[2001]: W1213 16:05:40.118785 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.118916 kubelet[2001]: E1213 16:05:40.118799 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.119224 kubelet[2001]: E1213 16:05:40.119114 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.119224 kubelet[2001]: W1213 16:05:40.119128 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.119224 kubelet[2001]: E1213 16:05:40.119146 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.119494 kubelet[2001]: E1213 16:05:40.119464 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.119494 kubelet[2001]: W1213 16:05:40.119485 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.119716 kubelet[2001]: E1213 16:05:40.119500 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.119903 kubelet[2001]: E1213 16:05:40.119875 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.119903 kubelet[2001]: W1213 16:05:40.119897 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.120175 kubelet[2001]: E1213 16:05:40.119913 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.122655 env[1196]: time="2024-12-13T16:05:40.122562109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:40.126205 env[1196]: time="2024-12-13T16:05:40.126147453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:40.128642 env[1196]: time="2024-12-13T16:05:40.128616826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:40.130339 env[1196]: time="2024-12-13T16:05:40.130314360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:40.131061 env[1196]: time="2024-12-13T16:05:40.131010375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 16:05:40.135518 env[1196]: time="2024-12-13T16:05:40.135486058Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 16:05:40.158726 env[1196]: time="2024-12-13T16:05:40.158678116Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924\"" Dec 13 16:05:40.160922 env[1196]: time="2024-12-13T16:05:40.160871932Z" level=info msg="StartContainer for \"e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924\"" Dec 13 16:05:40.184234 kubelet[2001]: E1213 16:05:40.184209 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.184234 kubelet[2001]: W1213 16:05:40.184228 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.184480 kubelet[2001]: E1213 16:05:40.184250 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.184520 kubelet[2001]: E1213 16:05:40.184509 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.184520 kubelet[2001]: W1213 16:05:40.184517 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.184593 kubelet[2001]: E1213 16:05:40.184530 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.184728 kubelet[2001]: E1213 16:05:40.184715 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.184728 kubelet[2001]: W1213 16:05:40.184727 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.184813 kubelet[2001]: E1213 16:05:40.184739 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.184927 kubelet[2001]: E1213 16:05:40.184911 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.184927 kubelet[2001]: W1213 16:05:40.184920 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.185035 kubelet[2001]: E1213 16:05:40.184932 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.185116 kubelet[2001]: E1213 16:05:40.185094 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.185116 kubelet[2001]: W1213 16:05:40.185112 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.185191 kubelet[2001]: E1213 16:05:40.185125 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.185264 kubelet[2001]: E1213 16:05:40.185254 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.185264 kubelet[2001]: W1213 16:05:40.185263 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.185348 kubelet[2001]: E1213 16:05:40.185273 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.185467 kubelet[2001]: E1213 16:05:40.185455 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.185467 kubelet[2001]: W1213 16:05:40.185465 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.185910 kubelet[2001]: E1213 16:05:40.185569 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.185910 kubelet[2001]: E1213 16:05:40.185588 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.185910 kubelet[2001]: W1213 16:05:40.185594 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.185910 kubelet[2001]: E1213 16:05:40.185794 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.186110 kubelet[2001]: E1213 16:05:40.185938 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.186110 kubelet[2001]: W1213 16:05:40.185946 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.186110 kubelet[2001]: E1213 16:05:40.185960 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.186221 kubelet[2001]: E1213 16:05:40.186157 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.186221 kubelet[2001]: W1213 16:05:40.186165 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.186221 kubelet[2001]: E1213 16:05:40.186176 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.186329 kubelet[2001]: E1213 16:05:40.186317 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.186329 kubelet[2001]: W1213 16:05:40.186327 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.186412 kubelet[2001]: E1213 16:05:40.186337 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.186511 kubelet[2001]: E1213 16:05:40.186499 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.186511 kubelet[2001]: W1213 16:05:40.186508 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.186606 kubelet[2001]: E1213 16:05:40.186519 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.195594 kubelet[2001]: E1213 16:05:40.195568 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.195594 kubelet[2001]: W1213 16:05:40.195585 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.195812 kubelet[2001]: E1213 16:05:40.195604 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.195850 kubelet[2001]: E1213 16:05:40.195838 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.195850 kubelet[2001]: W1213 16:05:40.195846 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.195922 kubelet[2001]: E1213 16:05:40.195859 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.196019 kubelet[2001]: E1213 16:05:40.196008 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.196019 kubelet[2001]: W1213 16:05:40.196017 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.196126 kubelet[2001]: E1213 16:05:40.196025 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.196446 kubelet[2001]: E1213 16:05:40.196432 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.196446 kubelet[2001]: W1213 16:05:40.196445 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.196542 kubelet[2001]: E1213 16:05:40.196456 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.196666 kubelet[2001]: E1213 16:05:40.196655 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.196666 kubelet[2001]: W1213 16:05:40.196665 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.196742 kubelet[2001]: E1213 16:05:40.196673 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.197403 kubelet[2001]: E1213 16:05:40.197386 2001 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 16:05:40.197403 kubelet[2001]: W1213 16:05:40.197399 2001 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 16:05:40.197519 kubelet[2001]: E1213 16:05:40.197410 2001 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 16:05:40.203481 systemd[1]: Started cri-containerd-e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924.scope. Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f09495d70a0 items=0 ppid=2522 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:40.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306533666266646135396431353766333139643962646365623637 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit: BPF prog-id=133 op=LOAD Dec 13 16:05:40.218000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032a9a8 items=0 ppid=2522 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:40.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306533666266646135396431353766333139643962646365623637 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit: BPF prog-id=134 op=LOAD Dec 13 16:05:40.218000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032a9f8 items=0 ppid=2522 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:40.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306533666266646135396431353766333139643962646365623637 Dec 13 16:05:40.218000 audit: BPF prog-id=134 op=UNLOAD Dec 13 16:05:40.218000 audit: BPF prog-id=133 op=UNLOAD Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:40.218000 audit: BPF prog-id=135 op=LOAD Dec 13 16:05:40.218000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032aa88 items=0 ppid=2522 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:40.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306533666266646135396431353766333139643962646365623637 Dec 13 16:05:40.248006 env[1196]: time="2024-12-13T16:05:40.247965215Z" level=info msg="StartContainer for \"e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924\" returns successfully" Dec 13 16:05:40.259989 systemd[1]: cri-containerd-e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924.scope: Deactivated successfully. Dec 13 16:05:40.264000 audit: BPF prog-id=135 op=UNLOAD Dec 13 16:05:40.289354 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924-rootfs.mount: Deactivated successfully. Dec 13 16:05:40.298607 env[1196]: time="2024-12-13T16:05:40.298565766Z" level=info msg="shim disconnected" id=e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924 Dec 13 16:05:40.298759 env[1196]: time="2024-12-13T16:05:40.298609380Z" level=warning msg="cleaning up after shim disconnected" id=e10e3fbfda59d157f319d9bdceb67379a0f5343ebf593336d124d4155c613924 namespace=k8s.io Dec 13 16:05:40.298759 env[1196]: time="2024-12-13T16:05:40.298621789Z" level=info msg="cleaning up dead shim" Dec 13 16:05:40.309135 env[1196]: time="2024-12-13T16:05:40.309090092Z" level=warning msg="cleanup warnings time=\"2024-12-13T16:05:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2711 runtime=io.containerd.runc.v2\n" Dec 13 16:05:40.953182 kubelet[2001]: E1213 16:05:40.953016 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:41.075818 env[1196]: time="2024-12-13T16:05:41.075236825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 16:05:42.953949 kubelet[2001]: E1213 16:05:42.953743 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:44.957501 kubelet[2001]: E1213 16:05:44.954264 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:46.953669 kubelet[2001]: E1213 16:05:46.953503 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:47.035257 env[1196]: time="2024-12-13T16:05:47.035187185Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:47.039658 env[1196]: time="2024-12-13T16:05:47.039614219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:47.042667 env[1196]: time="2024-12-13T16:05:47.042622798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:47.044499 env[1196]: time="2024-12-13T16:05:47.044473890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:47.045366 env[1196]: time="2024-12-13T16:05:47.045337478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 16:05:47.050323 env[1196]: time="2024-12-13T16:05:47.050294453Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 16:05:47.070136 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount775515175.mount: Deactivated successfully. Dec 13 16:05:47.074169 env[1196]: time="2024-12-13T16:05:47.074114811Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5\"" Dec 13 16:05:47.076189 env[1196]: time="2024-12-13T16:05:47.076157961Z" level=info msg="StartContainer for \"aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5\"" Dec 13 16:05:47.103287 systemd[1]: Started cri-containerd-aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5.scope. Dec 13 16:05:47.135000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.137169 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 16:05:47.137401 kernel: audit: type=1400 audit(1734105947.135:1015): avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.140111 kernel: audit: type=1300 audit(1734105947.135:1015): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8a2b40d2f8 items=0 ppid=2522 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:47.135000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f8a2b40d2f8 items=0 ppid=2522 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:47.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161316433623965613664333036383930373732623932366366643465 Dec 13 16:05:47.148447 kernel: audit: type=1327 audit(1734105947.135:1015): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161316433623965613664333036383930373732623932366366643465 Dec 13 16:05:47.149321 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.157054 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.161056 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.165063 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.173080 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.173156 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.173185 kernel: audit: type=1400 audit(1734105947.136:1016): avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.136000 audit: BPF prog-id=136 op=LOAD Dec 13 16:05:47.136000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024238 items=0 ppid=2522 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:47.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161316433623965613664333036383930373732623932366366643465 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.139000 audit: BPF prog-id=137 op=LOAD Dec 13 16:05:47.139000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024288 items=0 ppid=2522 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:47.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161316433623965613664333036383930373732623932366366643465 Dec 13 16:05:47.143000 audit: BPF prog-id=137 op=UNLOAD Dec 13 16:05:47.143000 audit: BPF prog-id=136 op=UNLOAD Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:47.143000 audit: BPF prog-id=138 op=LOAD Dec 13 16:05:47.143000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024318 items=0 ppid=2522 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:47.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161316433623965613664333036383930373732623932366366643465 Dec 13 16:05:47.176491 env[1196]: time="2024-12-13T16:05:47.175128052Z" level=info msg="StartContainer for \"aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5\" returns successfully" Dec 13 16:05:47.861000 env[1196]: time="2024-12-13T16:05:47.860841735Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 16:05:47.868066 systemd[1]: cri-containerd-aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5.scope: Deactivated successfully. Dec 13 16:05:47.872000 audit: BPF prog-id=138 op=UNLOAD Dec 13 16:05:47.890902 kubelet[2001]: I1213 16:05:47.890851 2001 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 16:05:47.906849 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5-rootfs.mount: Deactivated successfully. Dec 13 16:05:47.910562 env[1196]: time="2024-12-13T16:05:47.910514328Z" level=info msg="shim disconnected" id=aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5 Dec 13 16:05:47.910905 env[1196]: time="2024-12-13T16:05:47.910884026Z" level=warning msg="cleaning up after shim disconnected" id=aa1d3b9ea6d306890772b926cfd4e632e8923c011f1264cffe367cedaa1fead5 namespace=k8s.io Dec 13 16:05:47.911012 env[1196]: time="2024-12-13T16:05:47.910996358Z" level=info msg="cleaning up dead shim" Dec 13 16:05:47.933453 env[1196]: time="2024-12-13T16:05:47.933343408Z" level=warning msg="cleanup warnings time=\"2024-12-13T16:05:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2777 runtime=io.containerd.runc.v2\n" Dec 13 16:05:47.983784 systemd[1]: Created slice kubepods-burstable-pod88f6eb05_bf67_44f8_9027_6bf2ed6d5cbb.slice. Dec 13 16:05:47.990243 systemd[1]: Created slice kubepods-besteffort-pod57885635_5e13_4531_867e_ee2bfa2b2c48.slice. Dec 13 16:05:47.995420 systemd[1]: Created slice kubepods-besteffort-podece652b9_48a6_420c_83c1_9f79a0ccbe51.slice. Dec 13 16:05:48.009532 systemd[1]: Created slice kubepods-burstable-pod05bf7863_f02b_4d3c_ab7d_3fe4572189b7.slice. Dec 13 16:05:48.016320 systemd[1]: Created slice kubepods-besteffort-podc4a59eaa_9273_486b_81f5_c8e41b40853e.slice. Dec 13 16:05:48.061884 kubelet[2001]: I1213 16:05:48.061804 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ece652b9-48a6-420c-83c1-9f79a0ccbe51-calico-apiserver-certs\") pod \"calico-apiserver-74c7d785bf-z8ppp\" (UID: \"ece652b9-48a6-420c-83c1-9f79a0ccbe51\") " pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" Dec 13 16:05:48.063029 kubelet[2001]: I1213 16:05:48.063003 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbwcq\" (UniqueName: \"kubernetes.io/projected/c4a59eaa-9273-486b-81f5-c8e41b40853e-kube-api-access-qbwcq\") pod \"calico-apiserver-74c7d785bf-xn9gr\" (UID: \"c4a59eaa-9273-486b-81f5-c8e41b40853e\") " pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" Dec 13 16:05:48.063183 kubelet[2001]: I1213 16:05:48.063166 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xg7dl\" (UniqueName: \"kubernetes.io/projected/ece652b9-48a6-420c-83c1-9f79a0ccbe51-kube-api-access-xg7dl\") pod \"calico-apiserver-74c7d785bf-z8ppp\" (UID: \"ece652b9-48a6-420c-83c1-9f79a0ccbe51\") " pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" Dec 13 16:05:48.063299 kubelet[2001]: I1213 16:05:48.063279 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb-config-volume\") pod \"coredns-6f6b679f8f-48scs\" (UID: \"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb\") " pod="kube-system/coredns-6f6b679f8f-48scs" Dec 13 16:05:48.063418 kubelet[2001]: I1213 16:05:48.063396 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c4a59eaa-9273-486b-81f5-c8e41b40853e-calico-apiserver-certs\") pod \"calico-apiserver-74c7d785bf-xn9gr\" (UID: \"c4a59eaa-9273-486b-81f5-c8e41b40853e\") " pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" Dec 13 16:05:48.063543 kubelet[2001]: I1213 16:05:48.063527 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqtgq\" (UniqueName: \"kubernetes.io/projected/88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb-kube-api-access-vqtgq\") pod \"coredns-6f6b679f8f-48scs\" (UID: \"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb\") " pod="kube-system/coredns-6f6b679f8f-48scs" Dec 13 16:05:48.063653 kubelet[2001]: I1213 16:05:48.063637 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/57885635-5e13-4531-867e-ee2bfa2b2c48-tigera-ca-bundle\") pod \"calico-kube-controllers-57f4cc6794-q9wn7\" (UID: \"57885635-5e13-4531-867e-ee2bfa2b2c48\") " pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" Dec 13 16:05:48.063754 kubelet[2001]: I1213 16:05:48.063737 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zlfj5\" (UniqueName: \"kubernetes.io/projected/57885635-5e13-4531-867e-ee2bfa2b2c48-kube-api-access-zlfj5\") pod \"calico-kube-controllers-57f4cc6794-q9wn7\" (UID: \"57885635-5e13-4531-867e-ee2bfa2b2c48\") " pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" Dec 13 16:05:48.063864 kubelet[2001]: I1213 16:05:48.063849 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/05bf7863-f02b-4d3c-ab7d-3fe4572189b7-config-volume\") pod \"coredns-6f6b679f8f-6gr9g\" (UID: \"05bf7863-f02b-4d3c-ab7d-3fe4572189b7\") " pod="kube-system/coredns-6f6b679f8f-6gr9g" Dec 13 16:05:48.063987 kubelet[2001]: I1213 16:05:48.063959 2001 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-868wh\" (UniqueName: \"kubernetes.io/projected/05bf7863-f02b-4d3c-ab7d-3fe4572189b7-kube-api-access-868wh\") pod \"coredns-6f6b679f8f-6gr9g\" (UID: \"05bf7863-f02b-4d3c-ab7d-3fe4572189b7\") " pod="kube-system/coredns-6f6b679f8f-6gr9g" Dec 13 16:05:48.115923 env[1196]: time="2024-12-13T16:05:48.115454721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 16:05:48.289254 env[1196]: time="2024-12-13T16:05:48.288740291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-48scs,Uid:88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:48.296679 env[1196]: time="2024-12-13T16:05:48.296637181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57f4cc6794-q9wn7,Uid:57885635-5e13-4531-867e-ee2bfa2b2c48,Namespace:calico-system,Attempt:0,}" Dec 13 16:05:48.304359 env[1196]: time="2024-12-13T16:05:48.304301945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-z8ppp,Uid:ece652b9-48a6-420c-83c1-9f79a0ccbe51,Namespace:calico-apiserver,Attempt:0,}" Dec 13 16:05:48.316775 env[1196]: time="2024-12-13T16:05:48.316734691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6gr9g,Uid:05bf7863-f02b-4d3c-ab7d-3fe4572189b7,Namespace:kube-system,Attempt:0,}" Dec 13 16:05:48.320395 env[1196]: time="2024-12-13T16:05:48.320362588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-xn9gr,Uid:c4a59eaa-9273-486b-81f5-c8e41b40853e,Namespace:calico-apiserver,Attempt:0,}" Dec 13 16:05:48.550264 env[1196]: time="2024-12-13T16:05:48.550171523Z" level=error msg="Failed to destroy network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.550581 env[1196]: time="2024-12-13T16:05:48.550543360Z" level=error msg="encountered an error cleaning up failed sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.550654 env[1196]: time="2024-12-13T16:05:48.550606694Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-48scs,Uid:88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.554240 kubelet[2001]: E1213 16:05:48.552149 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.557136 kubelet[2001]: E1213 16:05:48.556077 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-48scs" Dec 13 16:05:48.557265 kubelet[2001]: E1213 16:05:48.557149 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-48scs" Dec 13 16:05:48.557265 kubelet[2001]: E1213 16:05:48.557225 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-48scs_kube-system(88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-48scs_kube-system(88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-48scs" podUID="88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb" Dec 13 16:05:48.566345 env[1196]: time="2024-12-13T16:05:48.566276597Z" level=error msg="Failed to destroy network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.567010 env[1196]: time="2024-12-13T16:05:48.566967407Z" level=error msg="encountered an error cleaning up failed sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.567879 env[1196]: time="2024-12-13T16:05:48.567835277Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6gr9g,Uid:05bf7863-f02b-4d3c-ab7d-3fe4572189b7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.568579 env[1196]: time="2024-12-13T16:05:48.567775332Z" level=error msg="Failed to destroy network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.568678 env[1196]: time="2024-12-13T16:05:48.568634454Z" level=error msg="encountered an error cleaning up failed sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.568728 env[1196]: time="2024-12-13T16:05:48.568681018Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-z8ppp,Uid:ece652b9-48a6-420c-83c1-9f79a0ccbe51,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.568898 kubelet[2001]: E1213 16:05:48.568857 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.568986 kubelet[2001]: E1213 16:05:48.568922 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" Dec 13 16:05:48.568986 kubelet[2001]: E1213 16:05:48.568943 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" Dec 13 16:05:48.569101 kubelet[2001]: E1213 16:05:48.568992 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74c7d785bf-z8ppp_calico-apiserver(ece652b9-48a6-420c-83c1-9f79a0ccbe51)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74c7d785bf-z8ppp_calico-apiserver(ece652b9-48a6-420c-83c1-9f79a0ccbe51)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" podUID="ece652b9-48a6-420c-83c1-9f79a0ccbe51" Dec 13 16:05:48.570939 env[1196]: time="2024-12-13T16:05:48.570887075Z" level=error msg="Failed to destroy network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.571388 env[1196]: time="2024-12-13T16:05:48.571352483Z" level=error msg="encountered an error cleaning up failed sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.571481 env[1196]: time="2024-12-13T16:05:48.571423015Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-xn9gr,Uid:c4a59eaa-9273-486b-81f5-c8e41b40853e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.571871 kubelet[2001]: E1213 16:05:48.571680 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.571871 kubelet[2001]: E1213 16:05:48.571696 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.571871 kubelet[2001]: E1213 16:05:48.571724 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-6gr9g" Dec 13 16:05:48.571871 kubelet[2001]: E1213 16:05:48.571748 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-6gr9g" Dec 13 16:05:48.572519 kubelet[2001]: E1213 16:05:48.571759 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" Dec 13 16:05:48.572519 kubelet[2001]: E1213 16:05:48.571781 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" Dec 13 16:05:48.572519 kubelet[2001]: E1213 16:05:48.571787 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-6gr9g_kube-system(05bf7863-f02b-4d3c-ab7d-3fe4572189b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-6gr9g_kube-system(05bf7863-f02b-4d3c-ab7d-3fe4572189b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-6gr9g" podUID="05bf7863-f02b-4d3c-ab7d-3fe4572189b7" Dec 13 16:05:48.572706 kubelet[2001]: E1213 16:05:48.571831 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74c7d785bf-xn9gr_calico-apiserver(c4a59eaa-9273-486b-81f5-c8e41b40853e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74c7d785bf-xn9gr_calico-apiserver(c4a59eaa-9273-486b-81f5-c8e41b40853e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" podUID="c4a59eaa-9273-486b-81f5-c8e41b40853e" Dec 13 16:05:48.579208 env[1196]: time="2024-12-13T16:05:48.579163892Z" level=error msg="Failed to destroy network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.579630 env[1196]: time="2024-12-13T16:05:48.579598447Z" level=error msg="encountered an error cleaning up failed sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.579767 env[1196]: time="2024-12-13T16:05:48.579735805Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57f4cc6794-q9wn7,Uid:57885635-5e13-4531-867e-ee2bfa2b2c48,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.580114 kubelet[2001]: E1213 16:05:48.580084 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:48.580191 kubelet[2001]: E1213 16:05:48.580129 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" Dec 13 16:05:48.580191 kubelet[2001]: E1213 16:05:48.580149 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" Dec 13 16:05:48.580288 kubelet[2001]: E1213 16:05:48.580204 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-57f4cc6794-q9wn7_calico-system(57885635-5e13-4531-867e-ee2bfa2b2c48)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-57f4cc6794-q9wn7_calico-system(57885635-5e13-4531-867e-ee2bfa2b2c48)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" podUID="57885635-5e13-4531-867e-ee2bfa2b2c48" Dec 13 16:05:48.968069 systemd[1]: Created slice kubepods-besteffort-pod7fa6fe39_063b_46d4_b2c6_3e9cbcebbc8e.slice. Dec 13 16:05:48.973779 env[1196]: time="2024-12-13T16:05:48.973733686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4j6p,Uid:7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e,Namespace:calico-system,Attempt:0,}" Dec 13 16:05:49.037619 env[1196]: time="2024-12-13T16:05:49.037558529Z" level=error msg="Failed to destroy network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.037967 env[1196]: time="2024-12-13T16:05:49.037916250Z" level=error msg="encountered an error cleaning up failed sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.038027 env[1196]: time="2024-12-13T16:05:49.037984855Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4j6p,Uid:7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.038314 kubelet[2001]: E1213 16:05:49.038270 2001 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.038412 kubelet[2001]: E1213 16:05:49.038348 2001 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:49.038412 kubelet[2001]: E1213 16:05:49.038381 2001 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f4j6p" Dec 13 16:05:49.039216 kubelet[2001]: E1213 16:05:49.038428 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f4j6p_calico-system(7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f4j6p_calico-system(7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:49.119587 kubelet[2001]: I1213 16:05:49.119510 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:05:49.125722 kubelet[2001]: I1213 16:05:49.125698 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:05:49.127112 kubelet[2001]: I1213 16:05:49.127089 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:05:49.127744 env[1196]: time="2024-12-13T16:05:49.127712436Z" level=info msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" Dec 13 16:05:49.128554 env[1196]: time="2024-12-13T16:05:49.127758681Z" level=info msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" Dec 13 16:05:49.128907 env[1196]: time="2024-12-13T16:05:49.127790649Z" level=info msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" Dec 13 16:05:49.132964 kubelet[2001]: I1213 16:05:49.132252 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:05:49.133096 env[1196]: time="2024-12-13T16:05:49.132822828Z" level=info msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" Dec 13 16:05:49.134449 kubelet[2001]: I1213 16:05:49.134413 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:05:49.135983 env[1196]: time="2024-12-13T16:05:49.135745199Z" level=info msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" Dec 13 16:05:49.138735 kubelet[2001]: I1213 16:05:49.137797 2001 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:05:49.139005 env[1196]: time="2024-12-13T16:05:49.138963032Z" level=info msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" Dec 13 16:05:49.220112 env[1196]: time="2024-12-13T16:05:49.219126824Z" level=error msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" failed" error="failed to destroy network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.220269 kubelet[2001]: E1213 16:05:49.219394 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:05:49.221436 kubelet[2001]: E1213 16:05:49.219476 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721"} Dec 13 16:05:49.221539 kubelet[2001]: E1213 16:05:49.221467 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.221539 kubelet[2001]: E1213 16:05:49.221512 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f4j6p" podUID="7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e" Dec 13 16:05:49.248091 env[1196]: time="2024-12-13T16:05:49.248007413Z" level=error msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" failed" error="failed to destroy network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.248355 kubelet[2001]: E1213 16:05:49.248315 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:05:49.248441 kubelet[2001]: E1213 16:05:49.248384 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901"} Dec 13 16:05:49.248441 kubelet[2001]: E1213 16:05:49.248420 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.248545 kubelet[2001]: E1213 16:05:49.248444 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-48scs" podUID="88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb" Dec 13 16:05:49.255738 env[1196]: time="2024-12-13T16:05:49.255669603Z" level=error msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" failed" error="failed to destroy network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.256244 kubelet[2001]: E1213 16:05:49.256104 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:05:49.256244 kubelet[2001]: E1213 16:05:49.256156 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093"} Dec 13 16:05:49.256244 kubelet[2001]: E1213 16:05:49.256208 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ece652b9-48a6-420c-83c1-9f79a0ccbe51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.256244 kubelet[2001]: E1213 16:05:49.256237 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ece652b9-48a6-420c-83c1-9f79a0ccbe51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" podUID="ece652b9-48a6-420c-83c1-9f79a0ccbe51" Dec 13 16:05:49.256890 env[1196]: time="2024-12-13T16:05:49.256852639Z" level=error msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" failed" error="failed to destroy network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.257058 kubelet[2001]: E1213 16:05:49.257020 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:05:49.257107 kubelet[2001]: E1213 16:05:49.257067 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c"} Dec 13 16:05:49.257107 kubelet[2001]: E1213 16:05:49.257096 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4a59eaa-9273-486b-81f5-c8e41b40853e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.257211 kubelet[2001]: E1213 16:05:49.257117 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4a59eaa-9273-486b-81f5-c8e41b40853e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" podUID="c4a59eaa-9273-486b-81f5-c8e41b40853e" Dec 13 16:05:49.259809 env[1196]: time="2024-12-13T16:05:49.259774621Z" level=error msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" failed" error="failed to destroy network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.260086 kubelet[2001]: E1213 16:05:49.260059 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:05:49.260180 kubelet[2001]: E1213 16:05:49.260094 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a"} Dec 13 16:05:49.260180 kubelet[2001]: E1213 16:05:49.260125 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"57885635-5e13-4531-867e-ee2bfa2b2c48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.260180 kubelet[2001]: E1213 16:05:49.260153 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"57885635-5e13-4531-867e-ee2bfa2b2c48\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" podUID="57885635-5e13-4531-867e-ee2bfa2b2c48" Dec 13 16:05:49.279791 env[1196]: time="2024-12-13T16:05:49.279744244Z" level=error msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" failed" error="failed to destroy network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 16:05:49.279969 kubelet[2001]: E1213 16:05:49.279921 2001 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:05:49.280035 kubelet[2001]: E1213 16:05:49.279975 2001 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9"} Dec 13 16:05:49.280035 kubelet[2001]: E1213 16:05:49.280004 2001 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"05bf7863-f02b-4d3c-ab7d-3fe4572189b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 16:05:49.280178 kubelet[2001]: E1213 16:05:49.280027 2001 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"05bf7863-f02b-4d3c-ab7d-3fe4572189b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-6gr9g" podUID="05bf7863-f02b-4d3c-ab7d-3fe4572189b7" Dec 13 16:05:50.783026 kubelet[2001]: I1213 16:05:50.781718 2001 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 16:05:50.892000 audit[3114]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:50.892000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffda92ad6c0 a2=0 a3=7ffda92ad6ac items=0 ppid=2146 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:50.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:50.900000 audit[3114]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:05:50.900000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffda92ad6c0 a2=0 a3=7ffda92ad6ac items=0 ppid=2146 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:50.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:05:57.533297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3613560400.mount: Deactivated successfully. Dec 13 16:05:57.565150 env[1196]: time="2024-12-13T16:05:57.565082923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:57.567051 env[1196]: time="2024-12-13T16:05:57.567006699Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:57.568140 env[1196]: time="2024-12-13T16:05:57.568112958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:57.569327 env[1196]: time="2024-12-13T16:05:57.569301516Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:05:57.569978 env[1196]: time="2024-12-13T16:05:57.569951855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 16:05:57.603948 env[1196]: time="2024-12-13T16:05:57.603396114Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 16:05:57.621737 env[1196]: time="2024-12-13T16:05:57.621690530Z" level=info msg="CreateContainer within sandbox \"6983f9c82f375c51b27641efae2554746c3748983029383052883e159806f50a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7\"" Dec 13 16:05:57.624350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1171535292.mount: Deactivated successfully. Dec 13 16:05:57.625370 env[1196]: time="2024-12-13T16:05:57.625236687Z" level=info msg="StartContainer for \"6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7\"" Dec 13 16:05:57.652427 systemd[1]: Started cri-containerd-6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7.scope. Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.688848 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 16:05:57.689725 kernel: audit: type=1400 audit(1734105957.684:1024): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff5e85a7b08 items=0 ppid=2522 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:57.695369 kernel: audit: type=1300 audit(1734105957.684:1024): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff5e85a7b08 items=0 ppid=2522 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:57.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313963343536393432383166396662393432646666653363656235 Dec 13 16:05:57.700299 kernel: audit: type=1327 audit(1734105957.684:1024): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313963343536393432383166396662393432646666653363656235 Dec 13 16:05:57.700494 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.706278 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.706526 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.709906 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.723310 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.723389 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.726192 kernel: audit: type=1400 audit(1734105957.684:1025): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit: BPF prog-id=139 op=LOAD Dec 13 16:05:57.684000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000314f08 items=0 ppid=2522 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:57.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313963343536393432383166396662393432646666653363656235 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit: BPF prog-id=140 op=LOAD Dec 13 16:05:57.684000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000314f58 items=0 ppid=2522 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:57.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313963343536393432383166396662393432646666653363656235 Dec 13 16:05:57.684000 audit: BPF prog-id=140 op=UNLOAD Dec 13 16:05:57.684000 audit: BPF prog-id=139 op=UNLOAD Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:57.684000 audit: BPF prog-id=141 op=LOAD Dec 13 16:05:57.684000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000314fe8 items=0 ppid=2522 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:57.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313963343536393432383166396662393432646666653363656235 Dec 13 16:05:57.730846 env[1196]: time="2024-12-13T16:05:57.730801650Z" level=info msg="StartContainer for \"6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7\" returns successfully" Dec 13 16:05:57.937109 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 16:05:57.937419 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 16:05:58.235086 kubelet[2001]: I1213 16:05:58.231519 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-md8mr" podStartSLOduration=2.720285305 podStartE2EDuration="25.229515213s" podCreationTimestamp="2024-12-13 16:05:33 +0000 UTC" firstStartedPulling="2024-12-13 16:05:35.061988114 +0000 UTC m=+15.426162708" lastFinishedPulling="2024-12-13 16:05:57.571218021 +0000 UTC m=+37.935392616" observedRunningTime="2024-12-13 16:05:58.224418739 +0000 UTC m=+38.588593354" watchObservedRunningTime="2024-12-13 16:05:58.229515213 +0000 UTC m=+38.593689832" Dec 13 16:05:59.225371 systemd[1]: run-containerd-runc-k8s.io-6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7-runc.MvNU30.mount: Deactivated successfully. Dec 13 16:05:59.506000 audit[3278]: AVC avc: denied { write } for pid=3278 comm="tee" name="fd" dev="proc" ino=28750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.506000 audit[3278]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff23f32a0b a2=241 a3=1b6 items=1 ppid=3244 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.506000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 16:05:59.506000 audit: PATH item=0 name="/dev/fd/63" inode=29735 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.506000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.516000 audit[3269]: AVC avc: denied { write } for pid=3269 comm="tee" name="fd" dev="proc" ino=29747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.519000 audit[3276]: AVC avc: denied { write } for pid=3276 comm="tee" name="fd" dev="proc" ino=29752 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.516000 audit[3269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebc7d79fb a2=241 a3=1b6 items=1 ppid=3238 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.516000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 16:05:59.516000 audit: PATH item=0 name="/dev/fd/63" inode=29717 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.523000 audit[3281]: AVC avc: denied { write } for pid=3281 comm="tee" name="fd" dev="proc" ino=29756 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.519000 audit[3276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc690c7a0c a2=241 a3=1b6 items=1 ppid=3253 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.519000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 16:05:59.519000 audit: PATH item=0 name="/dev/fd/63" inode=29732 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.519000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.523000 audit[3281]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7c1f1a0a a2=241 a3=1b6 items=1 ppid=3236 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.523000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 16:05:59.523000 audit: PATH item=0 name="/dev/fd/63" inode=29736 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.571000 audit[3298]: AVC avc: denied { write } for pid=3298 comm="tee" name="fd" dev="proc" ino=29771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.571000 audit[3298]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5a764a0a a2=241 a3=1b6 items=1 ppid=3239 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.571000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 16:05:59.571000 audit: PATH item=0 name="/dev/fd/63" inode=28754 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.578000 audit[3302]: AVC avc: denied { write } for pid=3302 comm="tee" name="fd" dev="proc" ino=29775 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.578000 audit[3302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0f286a0a a2=241 a3=1b6 items=1 ppid=3241 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.578000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 16:05:59.578000 audit: PATH item=0 name="/dev/fd/63" inode=28755 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.578000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.581000 audit[3307]: AVC avc: denied { write } for pid=3307 comm="tee" name="fd" dev="proc" ino=28759 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 16:05:59.581000 audit[3307]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcda41e9fa a2=241 a3=1b6 items=1 ppid=3250 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.581000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 16:05:59.581000 audit: PATH item=0 name="/dev/fd/63" inode=28756 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 16:05:59.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.833000 audit: BPF prog-id=142 op=LOAD Dec 13 16:05:59.833000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca9b3fcb0 a2=98 a3=3 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.837000 audit: BPF prog-id=142 op=UNLOAD Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.837000 audit: BPF prog-id=143 op=LOAD Dec 13 16:05:59.837000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca9b3fa90 a2=74 a3=540051 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.837000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.838000 audit: BPF prog-id=143 op=UNLOAD Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.838000 audit: BPF prog-id=144 op=LOAD Dec 13 16:05:59.838000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca9b3fac0 a2=94 a3=2 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.839000 audit: BPF prog-id=144 op=UNLOAD Dec 13 16:05:59.972327 env[1196]: time="2024-12-13T16:05:59.972216969Z" level=info msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.979000 audit: BPF prog-id=145 op=LOAD Dec 13 16:05:59.979000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca9b3f980 a2=40 a3=1 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.980000 audit: BPF prog-id=145 op=UNLOAD Dec 13 16:05:59.980000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.980000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca9b3fa50 a2=50 a3=7ffca9b3fb30 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.992000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.992000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3f990 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.992000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9b3f9c0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9b3f8d0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3f9e0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3f9c0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3f9b0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3f9e0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9b3f9c0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9b3f9e0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca9b3f9b0 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.993000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.993000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca9b3fa20 a2=28 a3=0 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca9b3f7d0 a2=50 a3=1 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit: BPF prog-id=146 op=LOAD Dec 13 16:05:59.995000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca9b3f7d0 a2=94 a3=5 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.995000 audit: BPF prog-id=146 op=UNLOAD Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca9b3f880 a2=50 a3=1 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca9b3f9a0 a2=4 a3=38 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.995000 audit[3348]: AVC avc: denied { confidentiality } for pid=3348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:05:59.995000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca9b3f9f0 a2=94 a3=6 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { confidentiality } for pid=3348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:05:59.997000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca9b3f1a0 a2=94 a3=83 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.997000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:05:59.997000 audit[3348]: AVC avc: denied { confidentiality } for pid=3348 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:05:59.997000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca9b3f1a0 a2=94 a3=83 items=0 ppid=3237 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:05:59.997000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.015000 audit: BPF prog-id=147 op=LOAD Dec 13 16:06:00.015000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50c6f710 a2=98 a3=1999999999999999 items=0 ppid=3237 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.015000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 16:06:00.016000 audit: BPF prog-id=147 op=UNLOAD Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.016000 audit: BPF prog-id=148 op=LOAD Dec 13 16:06:00.016000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50c6f5f0 a2=74 a3=ffff items=0 ppid=3237 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.016000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 16:06:00.017000 audit: BPF prog-id=148 op=UNLOAD Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { perfmon } for pid=3371 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit[3371]: AVC avc: denied { bpf } for pid=3371 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.017000 audit: BPF prog-id=149 op=LOAD Dec 13 16:06:00.017000 audit[3371]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50c6f630 a2=40 a3=7ffd50c6f810 items=0 ppid=3237 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.017000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 16:06:00.017000 audit: BPF prog-id=149 op=UNLOAD Dec 13 16:06:00.142694 systemd-networkd[1034]: vxlan.calico: Link UP Dec 13 16:06:00.142709 systemd-networkd[1034]: vxlan.calico: Gained carrier Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.187000 audit: BPF prog-id=150 op=LOAD Dec 13 16:06:00.187000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe55bb6530 a2=98 a3=ffffffff items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.187000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit: BPF prog-id=150 op=UNLOAD Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit: BPF prog-id=151 op=LOAD Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe55bb6340 a2=74 a3=540051 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit: BPF prog-id=151 op=UNLOAD Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit: BPF prog-id=152 op=LOAD Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe55bb6370 a2=94 a3=2 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit: BPF prog-id=152 op=UNLOAD Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb6240 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe55bb6270 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe55bb6180 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb6290 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb6270 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb6260 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb6290 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe55bb6270 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.188000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.188000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe55bb6290 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe55bb6260 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.189000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe55bb62d0 a2=28 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.189000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.189000 audit: BPF prog-id=153 op=LOAD Dec 13 16:06:00.189000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe55bb6140 a2=40 a3=0 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.189000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.189000 audit: BPF prog-id=153 op=UNLOAD Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe55bb6130 a2=50 a3=2800 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe55bb6130 a2=50 a3=2800 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit: BPF prog-id=154 op=LOAD Dec 13 16:06:00.190000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe55bb5950 a2=94 a3=2 items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.190000 audit: BPF prog-id=154 op=UNLOAD Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { perfmon } for pid=3404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit[3404]: AVC avc: denied { bpf } for pid=3404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.190000 audit: BPF prog-id=155 op=LOAD Dec 13 16:06:00.190000 audit[3404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe55bb5a50 a2=94 a3=2d items=0 ppid=3237 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit: BPF prog-id=156 op=LOAD Dec 13 16:06:00.193000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe43505f60 a2=98 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.193000 audit: BPF prog-id=156 op=UNLOAD Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.193000 audit: BPF prog-id=157 op=LOAD Dec 13 16:06:00.193000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43505d40 a2=74 a3=540051 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.197000 audit: BPF prog-id=157 op=UNLOAD Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.197000 audit: BPF prog-id=158 op=LOAD Dec 13 16:06:00.197000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43505d70 a2=94 a3=2 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.197000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.197000 audit: BPF prog-id=158 op=UNLOAD Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.059 [INFO][3364] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.061 [INFO][3364] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" iface="eth0" netns="/var/run/netns/cni-106c486e-ffd5-abf1-a5b5-2d74f9a7b451" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.061 [INFO][3364] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" iface="eth0" netns="/var/run/netns/cni-106c486e-ffd5-abf1-a5b5-2d74f9a7b451" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.063 [INFO][3364] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" iface="eth0" netns="/var/run/netns/cni-106c486e-ffd5-abf1-a5b5-2d74f9a7b451" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.063 [INFO][3364] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.063 [INFO][3364] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.353 [INFO][3384] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.355 [INFO][3384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.355 [INFO][3384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.368 [WARNING][3384] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.368 [INFO][3384] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.373 [INFO][3384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:00.379599 env[1196]: 2024-12-13 16:06:00.376 [INFO][3364] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:00.385087 systemd[1]: run-netns-cni\x2d106c486e\x2dffd5\x2dabf1\x2da5b5\x2d2d74f9a7b451.mount: Deactivated successfully. Dec 13 16:06:00.385429 env[1196]: time="2024-12-13T16:06:00.385267088Z" level=info msg="TearDown network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" successfully" Dec 13 16:06:00.385429 env[1196]: time="2024-12-13T16:06:00.385330872Z" level=info msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" returns successfully" Dec 13 16:06:00.387804 env[1196]: time="2024-12-13T16:06:00.387665705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57f4cc6794-q9wn7,Uid:57885635-5e13-4531-867e-ee2bfa2b2c48,Namespace:calico-system,Attempt:1,}" Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit: BPF prog-id=159 op=LOAD Dec 13 16:06:00.461000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe43505c30 a2=40 a3=1 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.461000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.461000 audit: BPF prog-id=159 op=UNLOAD Dec 13 16:06:00.461000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.461000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe43505d00 a2=50 a3=7ffe43505de0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.461000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.474000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.474000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505c40 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.474000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.475000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.475000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43505c70 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.475000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.475000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.475000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43505b80 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.475000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505c90 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505c70 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505c60 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505c90 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43505c70 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.479000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.479000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43505c90 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.481000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.481000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe43505c60 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.481000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.481000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.481000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe43505cd0 a2=28 a3=0 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.481000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe43505a80 a2=50 a3=1 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.483000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit: BPF prog-id=160 op=LOAD Dec 13 16:06:00.483000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe43505a80 a2=94 a3=5 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.483000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.483000 audit: BPF prog-id=160 op=UNLOAD Dec 13 16:06:00.483000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.483000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe43505b30 a2=50 a3=1 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.483000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe43505c50 a2=4 a3=38 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.485000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:06:00.485000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43505ca0 a2=94 a3=6 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.485000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.485000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:06:00.485000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43505450 a2=94 a3=83 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.485000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.487000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 16:06:00.487000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe43505450 a2=94 a3=83 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.487000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.488000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.488000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe43506e90 a2=10 a3=f1f00800 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.488000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.489000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.489000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe43506d30 a2=10 a3=3 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.489000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.489000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.489000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe43506cd0 a2=10 a3=3 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.489000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.489000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.489000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe43506cd0 a2=10 a3=7 items=0 ppid=3237 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.489000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 16:06:00.502000 audit: BPF prog-id=155 op=UNLOAD Dec 13 16:06:00.584115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4477c37884d: link becomes ready Dec 13 16:06:00.584521 systemd-networkd[1034]: cali4477c37884d: Link UP Dec 13 16:06:00.584713 systemd-networkd[1034]: cali4477c37884d: Gained carrier Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.458 [INFO][3442] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0 calico-kube-controllers-57f4cc6794- calico-system 57885635-5e13-4531-867e-ee2bfa2b2c48 742 0 2024-12-13 16:05:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:57f4cc6794 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com calico-kube-controllers-57f4cc6794-q9wn7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4477c37884d [] []}} ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.458 [INFO][3442] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.512 [INFO][3453] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" HandleID="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.533 [INFO][3453] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" HandleID="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311990), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"calico-kube-controllers-57f4cc6794-q9wn7", "timestamp":"2024-12-13 16:06:00.512800852 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.533 [INFO][3453] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.533 [INFO][3453] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.533 [INFO][3453] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.537 [INFO][3453] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.543 [INFO][3453] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.549 [INFO][3453] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.551 [INFO][3453] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.554 [INFO][3453] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.554 [INFO][3453] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.556 [INFO][3453] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.561 [INFO][3453] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.568 [INFO][3453] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.129/26] block=192.168.62.128/26 handle="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.568 [INFO][3453] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.129/26] handle="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.568 [INFO][3453] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:00.611377 env[1196]: 2024-12-13 16:06:00.568 [INFO][3453] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.129/26] IPv6=[] ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" HandleID="k8s-pod-network.e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.573 [INFO][3442] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0", GenerateName:"calico-kube-controllers-57f4cc6794-", Namespace:"calico-system", SelfLink:"", UID:"57885635-5e13-4531-867e-ee2bfa2b2c48", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57f4cc6794", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-57f4cc6794-q9wn7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4477c37884d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.573 [INFO][3442] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.129/32] ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.573 [INFO][3442] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4477c37884d ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.584 [INFO][3442] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.593 [INFO][3442] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0", GenerateName:"calico-kube-controllers-57f4cc6794-", Namespace:"calico-system", SelfLink:"", UID:"57885635-5e13-4531-867e-ee2bfa2b2c48", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57f4cc6794", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f", Pod:"calico-kube-controllers-57f4cc6794-q9wn7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4477c37884d", MAC:"9e:26:91:4c:c2:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:00.614000 env[1196]: 2024-12-13 16:06:00.605 [INFO][3442] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f" Namespace="calico-system" Pod="calico-kube-controllers-57f4cc6794-q9wn7" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:00.637628 env[1196]: time="2024-12-13T16:06:00.637453059Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:00.638169 env[1196]: time="2024-12-13T16:06:00.638092491Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:00.638584 env[1196]: time="2024-12-13T16:06:00.638497861Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:00.639980 env[1196]: time="2024-12-13T16:06:00.639840945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f pid=3497 runtime=io.containerd.runc.v2 Dec 13 16:06:00.677861 systemd[1]: Started cri-containerd-e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f.scope. Dec 13 16:06:00.688000 audit[3518]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=3518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:00.688000 audit[3518]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcca2092e0 a2=0 a3=7ffcca2092cc items=0 ppid=3237 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:00.688000 audit[3523]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3523 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:00.688000 audit[3523]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffceb5eb10 a2=0 a3=5593bbd98000 items=0 ppid=3237 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:00.690000 audit[3519]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3519 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:00.690000 audit[3519]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd77f6c6e0 a2=0 a3=7ffd77f6c6cc items=0 ppid=3237 pid=3519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:00.699000 audit[3524]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3524 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:00.699000 audit[3524]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdfd34c450 a2=0 a3=7ffdfd34c43c items=0 ppid=3237 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.714000 audit: BPF prog-id=161 op=LOAD Dec 13 16:06:00.715000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.715000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3497 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536383261333735326133306233303635616135663334613661306439 Dec 13 16:06:00.715000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.715000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3497 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536383261333735326133306233303635616135663334613661306439 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit: BPF prog-id=162 op=LOAD Dec 13 16:06:00.716000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d8c90 items=0 ppid=3497 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536383261333735326133306233303635616135663334613661306439 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit: BPF prog-id=163 op=LOAD Dec 13 16:06:00.716000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d8cd8 items=0 ppid=3497 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536383261333735326133306233303635616135663334613661306439 Dec 13 16:06:00.716000 audit: BPF prog-id=163 op=UNLOAD Dec 13 16:06:00.716000 audit: BPF prog-id=162 op=UNLOAD Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:00.716000 audit: BPF prog-id=164 op=LOAD Dec 13 16:06:00.716000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d90e8 items=0 ppid=3497 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536383261333735326133306233303635616135663334613661306439 Dec 13 16:06:00.748000 audit[3543]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:00.748000 audit[3543]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd69820ee0 a2=0 a3=7ffd69820ecc items=0 ppid=3237 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:00.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:00.753847 env[1196]: time="2024-12-13T16:06:00.753810316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57f4cc6794-q9wn7,Uid:57885635-5e13-4531-867e-ee2bfa2b2c48,Namespace:calico-system,Attempt:1,} returns sandbox id \"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f\"" Dec 13 16:06:00.759594 env[1196]: time="2024-12-13T16:06:00.759557771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 16:06:01.653723 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Dec 13 16:06:01.716459 systemd-networkd[1034]: cali4477c37884d: Gained IPv6LL Dec 13 16:06:01.956636 env[1196]: time="2024-12-13T16:06:01.956441480Z" level=info msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" Dec 13 16:06:01.958238 env[1196]: time="2024-12-13T16:06:01.958180297Z" level=info msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.035 [INFO][3581] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.035 [INFO][3581] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" iface="eth0" netns="/var/run/netns/cni-999b54bf-c2b7-2d55-561c-30118a3425fa" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.036 [INFO][3581] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" iface="eth0" netns="/var/run/netns/cni-999b54bf-c2b7-2d55-561c-30118a3425fa" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.036 [INFO][3581] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" iface="eth0" netns="/var/run/netns/cni-999b54bf-c2b7-2d55-561c-30118a3425fa" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.036 [INFO][3581] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.036 [INFO][3581] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.070 [INFO][3593] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.071 [INFO][3593] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.071 [INFO][3593] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.080 [WARNING][3593] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.080 [INFO][3593] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.082 [INFO][3593] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:02.087539 env[1196]: 2024-12-13 16:06:02.086 [INFO][3581] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:02.090773 systemd[1]: run-netns-cni\x2d999b54bf\x2dc2b7\x2d2d55\x2d561c\x2d30118a3425fa.mount: Deactivated successfully. Dec 13 16:06:02.092273 env[1196]: time="2024-12-13T16:06:02.092228648Z" level=info msg="TearDown network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" successfully" Dec 13 16:06:02.092386 env[1196]: time="2024-12-13T16:06:02.092362750Z" level=info msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" returns successfully" Dec 13 16:06:02.093320 env[1196]: time="2024-12-13T16:06:02.093286970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4j6p,Uid:7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e,Namespace:calico-system,Attempt:1,}" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.061 [INFO][3582] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.063 [INFO][3582] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" iface="eth0" netns="/var/run/netns/cni-1d976367-79ad-50a9-2880-1f19fbba2b1f" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.063 [INFO][3582] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" iface="eth0" netns="/var/run/netns/cni-1d976367-79ad-50a9-2880-1f19fbba2b1f" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.063 [INFO][3582] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" iface="eth0" netns="/var/run/netns/cni-1d976367-79ad-50a9-2880-1f19fbba2b1f" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.063 [INFO][3582] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.063 [INFO][3582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.127 [INFO][3598] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.128 [INFO][3598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.128 [INFO][3598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.137 [WARNING][3598] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.137 [INFO][3598] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.142 [INFO][3598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:02.150463 env[1196]: 2024-12-13 16:06:02.145 [INFO][3582] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:02.149873 systemd[1]: run-netns-cni\x2d1d976367\x2d79ad\x2d50a9\x2d2880\x2d1f19fbba2b1f.mount: Deactivated successfully. Dec 13 16:06:02.152195 env[1196]: time="2024-12-13T16:06:02.152150469Z" level=info msg="TearDown network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" successfully" Dec 13 16:06:02.152294 env[1196]: time="2024-12-13T16:06:02.152276463Z" level=info msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" returns successfully" Dec 13 16:06:02.155807 env[1196]: time="2024-12-13T16:06:02.153980960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-48scs,Uid:88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb,Namespace:kube-system,Attempt:1,}" Dec 13 16:06:02.325328 systemd-networkd[1034]: caliaafd46b86c7: Link UP Dec 13 16:06:02.331023 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 16:06:02.332079 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaafd46b86c7: link becomes ready Dec 13 16:06:02.331202 systemd-networkd[1034]: caliaafd46b86c7: Gained carrier Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.188 [INFO][3604] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0 csi-node-driver- calico-system 7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e 754 0 2024-12-13 16:05:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com csi-node-driver-f4j6p eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliaafd46b86c7 [] []}} ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.188 [INFO][3604] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.260 [INFO][3628] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" HandleID="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.272 [INFO][3628] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" HandleID="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003606c0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"csi-node-driver-f4j6p", "timestamp":"2024-12-13 16:06:02.260407003 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.275 [INFO][3628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.276 [INFO][3628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.276 [INFO][3628] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.283 [INFO][3628] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.288 [INFO][3628] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.298 [INFO][3628] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.301 [INFO][3628] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.304 [INFO][3628] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.304 [INFO][3628] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.306 [INFO][3628] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.311 [INFO][3628] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.317 [INFO][3628] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.130/26] block=192.168.62.128/26 handle="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.317 [INFO][3628] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.130/26] handle="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.317 [INFO][3628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:02.351910 env[1196]: 2024-12-13 16:06:02.318 [INFO][3628] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.130/26] IPv6=[] ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" HandleID="k8s-pod-network.2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.321 [INFO][3604] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-f4j6p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaafd46b86c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.321 [INFO][3604] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.130/32] ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.321 [INFO][3604] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaafd46b86c7 ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.332 [INFO][3604] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.332 [INFO][3604] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a", Pod:"csi-node-driver-f4j6p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaafd46b86c7", MAC:"4e:6f:88:6f:0f:ba", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:02.352973 env[1196]: 2024-12-13 16:06:02.344 [INFO][3604] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a" Namespace="calico-system" Pod="csi-node-driver-f4j6p" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:02.371215 env[1196]: time="2024-12-13T16:06:02.370140241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:02.371215 env[1196]: time="2024-12-13T16:06:02.370176887Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:02.371215 env[1196]: time="2024-12-13T16:06:02.370189267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:02.371215 env[1196]: time="2024-12-13T16:06:02.370395213Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a pid=3660 runtime=io.containerd.runc.v2 Dec 13 16:06:02.403000 audit[3673]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:02.403000 audit[3673]: SYSCALL arch=c000003e syscall=46 success=yes exit=18640 a0=3 a1=7ffd370ecc50 a2=0 a3=7ffd370ecc3c items=0 ppid=3237 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.403000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:02.411035 systemd[1]: Started cri-containerd-2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a.scope. Dec 13 16:06:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit: BPF prog-id=165 op=LOAD Dec 13 16:06:02.434000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336633356334336435323461656462383738373438663730613936 Dec 13 16:06:02.434000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.434000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336633356334336435323461656462383738373438663730613936 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit: BPF prog-id=166 op=LOAD Dec 13 16:06:02.435000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000269d50 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336633356334336435323461656462383738373438663730613936 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit: BPF prog-id=167 op=LOAD Dec 13 16:06:02.435000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000269d98 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336633356334336435323461656462383738373438663730613936 Dec 13 16:06:02.435000 audit: BPF prog-id=167 op=UNLOAD Dec 13 16:06:02.435000 audit: BPF prog-id=166 op=UNLOAD Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { perfmon } for pid=3672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit[3672]: AVC avc: denied { bpf } for pid=3672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.435000 audit: BPF prog-id=168 op=LOAD Dec 13 16:06:02.435000 audit[3672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d21a8 items=0 ppid=3660 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336633356334336435323461656462383738373438663730613936 Dec 13 16:06:02.456127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a9d28639e6: link becomes ready Dec 13 16:06:02.461303 systemd-networkd[1034]: cali7a9d28639e6: Link UP Dec 13 16:06:02.462335 systemd-networkd[1034]: cali7a9d28639e6: Gained carrier Dec 13 16:06:02.476903 env[1196]: time="2024-12-13T16:06:02.476859219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4j6p,Uid:7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e,Namespace:calico-system,Attempt:1,} returns sandbox id \"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a\"" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.240 [INFO][3616] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0 coredns-6f6b679f8f- kube-system 88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb 755 0 2024-12-13 16:05:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com coredns-6f6b679f8f-48scs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7a9d28639e6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.240 [INFO][3616] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.288 [INFO][3634] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" HandleID="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.301 [INFO][3634] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" HandleID="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000361370), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"coredns-6f6b679f8f-48scs", "timestamp":"2024-12-13 16:06:02.288596708 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.301 [INFO][3634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.318 [INFO][3634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.319 [INFO][3634] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.380 [INFO][3634] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.389 [INFO][3634] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.413 [INFO][3634] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.418 [INFO][3634] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.421 [INFO][3634] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.421 [INFO][3634] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.423 [INFO][3634] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80 Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.430 [INFO][3634] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.441 [INFO][3634] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.131/26] block=192.168.62.128/26 handle="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.441 [INFO][3634] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.131/26] handle="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.441 [INFO][3634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:02.487002 env[1196]: 2024-12-13 16:06:02.441 [INFO][3634] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.131/26] IPv6=[] ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" HandleID="k8s-pod-network.d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.447 [INFO][3616] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"coredns-6f6b679f8f-48scs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9d28639e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.448 [INFO][3616] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.131/32] ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.448 [INFO][3616] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7a9d28639e6 ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.456 [INFO][3616] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.463 [INFO][3616] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80", Pod:"coredns-6f6b679f8f-48scs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9d28639e6", MAC:"aa:62:5c:9f:6a:4b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:02.487808 env[1196]: 2024-12-13 16:06:02.480 [INFO][3616] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80" Namespace="kube-system" Pod="coredns-6f6b679f8f-48scs" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:02.506852 env[1196]: time="2024-12-13T16:06:02.506765364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:02.506852 env[1196]: time="2024-12-13T16:06:02.506824875Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:02.507213 env[1196]: time="2024-12-13T16:06:02.506837437Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:02.507493 env[1196]: time="2024-12-13T16:06:02.507457565Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80 pid=3716 runtime=io.containerd.runc.v2 Dec 13 16:06:02.517000 audit[3722]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3722 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:02.517000 audit[3722]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffd30682080 a2=0 a3=7ffd3068206c items=0 ppid=3237 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:02.525382 systemd[1]: Started cri-containerd-d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80.scope. Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.558000 audit: BPF prog-id=169 op=LOAD Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3716 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431303734363737313233666638336234323966343432333465646532 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3716 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431303734363737313233666638336234323966343432333465646532 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit: BPF prog-id=170 op=LOAD Dec 13 16:06:02.559000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cf050 items=0 ppid=3716 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431303734363737313233666638336234323966343432333465646532 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit: BPF prog-id=171 op=LOAD Dec 13 16:06:02.559000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cf098 items=0 ppid=3716 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431303734363737313233666638336234323966343432333465646532 Dec 13 16:06:02.559000 audit: BPF prog-id=171 op=UNLOAD Dec 13 16:06:02.559000 audit: BPF prog-id=170 op=UNLOAD Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.559000 audit: BPF prog-id=172 op=LOAD Dec 13 16:06:02.559000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cf4a8 items=0 ppid=3716 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431303734363737313233666638336234323966343432333465646532 Dec 13 16:06:02.594252 env[1196]: time="2024-12-13T16:06:02.594149512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-48scs,Uid:88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb,Namespace:kube-system,Attempt:1,} returns sandbox id \"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80\"" Dec 13 16:06:02.601827 env[1196]: time="2024-12-13T16:06:02.601727375Z" level=info msg="CreateContainer within sandbox \"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 16:06:02.624018 env[1196]: time="2024-12-13T16:06:02.623944521Z" level=info msg="CreateContainer within sandbox \"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c07e92805f8efca079f84995fa617224ed99857c8a46dea46bd35630a4031c0d\"" Dec 13 16:06:02.628761 env[1196]: time="2024-12-13T16:06:02.626703852Z" level=info msg="StartContainer for \"c07e92805f8efca079f84995fa617224ed99857c8a46dea46bd35630a4031c0d\"" Dec 13 16:06:02.659714 systemd[1]: Started cri-containerd-c07e92805f8efca079f84995fa617224ed99857c8a46dea46bd35630a4031c0d.scope. Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.701591 kernel: kauditd_printk_skb: 728 callbacks suppressed Dec 13 16:06:02.701753 kernel: audit: type=1400 audit(1734105962.695:1189): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.701801 kernel: audit: type=1400 audit(1734105962.695:1190): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.704095 kernel: audit: type=1400 audit(1734105962.695:1191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.706848 kernel: audit: type=1400 audit(1734105962.695:1192): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.709656 kernel: audit: type=1400 audit(1734105962.695:1193): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.712390 kernel: audit: type=1400 audit(1734105962.695:1194): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.715214 kernel: audit: type=1400 audit(1734105962.695:1195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.721142 kernel: audit: type=1400 audit(1734105962.695:1196): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.721200 kernel: audit: type=1400 audit(1734105962.695:1197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.726700 kernel: audit: type=1400 audit(1734105962.695:1198): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.695000 audit: BPF prog-id=173 op=LOAD Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330376539323830356638656663613037396638343939356661363137 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330376539323830356638656663613037396638343939356661363137 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit: BPF prog-id=174 op=LOAD Dec 13 16:06:02.696000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000247720 items=0 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330376539323830356638656663613037396638343939356661363137 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit: BPF prog-id=175 op=LOAD Dec 13 16:06:02.696000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000247768 items=0 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330376539323830356638656663613037396638343939356661363137 Dec 13 16:06:02.696000 audit: BPF prog-id=175 op=UNLOAD Dec 13 16:06:02.696000 audit: BPF prog-id=174 op=UNLOAD Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:02.696000 audit: BPF prog-id=176 op=LOAD Dec 13 16:06:02.696000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000247b78 items=0 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:02.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330376539323830356638656663613037396638343939356661363137 Dec 13 16:06:02.738820 env[1196]: time="2024-12-13T16:06:02.738780740Z" level=info msg="StartContainer for \"c07e92805f8efca079f84995fa617224ed99857c8a46dea46bd35630a4031c0d\" returns successfully" Dec 13 16:06:03.301057 kubelet[2001]: I1213 16:06:03.300993 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-48scs" podStartSLOduration=40.300954491 podStartE2EDuration="40.300954491s" podCreationTimestamp="2024-12-13 16:05:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:06:03.267152335 +0000 UTC m=+43.631326952" watchObservedRunningTime="2024-12-13 16:06:03.300954491 +0000 UTC m=+43.665129106" Dec 13 16:06:03.414000 audit[3790]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:03.414000 audit[3790]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa51f9fd0 a2=0 a3=7fffa51f9fbc items=0 ppid=2146 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:03.419000 audit[3790]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:03.419000 audit[3790]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa51f9fd0 a2=0 a3=0 items=0 ppid=2146 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:03.436000 audit[3792]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:03.436000 audit[3792]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd40c16e30 a2=0 a3=7ffd40c16e1c items=0 ppid=2146 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:03.442000 audit[3792]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:03.442000 audit[3792]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd40c16e30 a2=0 a3=7ffd40c16e1c items=0 ppid=2146 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:03.699319 systemd-networkd[1034]: caliaafd46b86c7: Gained IPv6LL Dec 13 16:06:03.820993 env[1196]: time="2024-12-13T16:06:03.820910891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:03.822252 env[1196]: time="2024-12-13T16:06:03.822211327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:03.824324 env[1196]: time="2024-12-13T16:06:03.824287877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:03.825958 env[1196]: time="2024-12-13T16:06:03.825845610Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:03.826538 env[1196]: time="2024-12-13T16:06:03.826486821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 16:06:03.829369 env[1196]: time="2024-12-13T16:06:03.829145143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 16:06:03.861423 env[1196]: time="2024-12-13T16:06:03.861383610Z" level=info msg="CreateContainer within sandbox \"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 16:06:03.879059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1098661320.mount: Deactivated successfully. Dec 13 16:06:03.881650 env[1196]: time="2024-12-13T16:06:03.881599233Z" level=info msg="CreateContainer within sandbox \"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35\"" Dec 13 16:06:03.882499 env[1196]: time="2024-12-13T16:06:03.882471763Z" level=info msg="StartContainer for \"5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35\"" Dec 13 16:06:03.922216 systemd[1]: Started cri-containerd-5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35.scope. Dec 13 16:06:03.956402 env[1196]: time="2024-12-13T16:06:03.956364650Z" level=info msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" Dec 13 16:06:03.957152 env[1196]: time="2024-12-13T16:06:03.956469235Z" level=info msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" Dec 13 16:06:03.962594 env[1196]: time="2024-12-13T16:06:03.962312720Z" level=info msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.963000 audit: BPF prog-id=177 op=LOAD Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3497 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383534363461643830303534636361613736383235316530356237 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3497 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383534363461643830303534636361613736383235316530356237 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit: BPF prog-id=178 op=LOAD Dec 13 16:06:03.967000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000217a40 items=0 ppid=3497 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383534363461643830303534636361613736383235316530356237 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit: BPF prog-id=179 op=LOAD Dec 13 16:06:03.967000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000217a88 items=0 ppid=3497 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383534363461643830303534636361613736383235316530356237 Dec 13 16:06:03.967000 audit: BPF prog-id=179 op=UNLOAD Dec 13 16:06:03.967000 audit: BPF prog-id=178 op=UNLOAD Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:03.967000 audit: BPF prog-id=180 op=LOAD Dec 13 16:06:03.967000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217e98 items=0 ppid=3497 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:03.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383534363461643830303534636361613736383235316530356237 Dec 13 16:06:04.121108 env[1196]: time="2024-12-13T16:06:04.121033499Z" level=info msg="StartContainer for \"5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35\" returns successfully" Dec 13 16:06:04.163272 systemd-networkd[1034]: cali7a9d28639e6: Gained IPv6LL Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.127 [INFO][3865] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.128 [INFO][3865] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" iface="eth0" netns="/var/run/netns/cni-6980fabf-2757-cec6-6650-024ce6610d34" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.128 [INFO][3865] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" iface="eth0" netns="/var/run/netns/cni-6980fabf-2757-cec6-6650-024ce6610d34" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.129 [INFO][3865] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" iface="eth0" netns="/var/run/netns/cni-6980fabf-2757-cec6-6650-024ce6610d34" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.129 [INFO][3865] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.129 [INFO][3865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.267 [INFO][3890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.270 [INFO][3890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.270 [INFO][3890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.284 [WARNING][3890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.284 [INFO][3890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.294 [INFO][3890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.319417 env[1196]: 2024-12-13 16:06:04.312 [INFO][3865] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:04.330875 env[1196]: time="2024-12-13T16:06:04.325030195Z" level=info msg="TearDown network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" successfully" Dec 13 16:06:04.330875 env[1196]: time="2024-12-13T16:06:04.325079334Z" level=info msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" returns successfully" Dec 13 16:06:04.330875 env[1196]: time="2024-12-13T16:06:04.325882861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-xn9gr,Uid:c4a59eaa-9273-486b-81f5-c8e41b40853e,Namespace:calico-apiserver,Attempt:1,}" Dec 13 16:06:04.324686 systemd[1]: run-netns-cni\x2d6980fabf\x2d2757\x2dcec6\x2d6650\x2d024ce6610d34.mount: Deactivated successfully. Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.131 [INFO][3861] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.132 [INFO][3861] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" iface="eth0" netns="/var/run/netns/cni-3e6dfa74-3af6-9690-8482-f76256c0dfc3" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.133 [INFO][3861] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" iface="eth0" netns="/var/run/netns/cni-3e6dfa74-3af6-9690-8482-f76256c0dfc3" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.133 [INFO][3861] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" iface="eth0" netns="/var/run/netns/cni-3e6dfa74-3af6-9690-8482-f76256c0dfc3" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.133 [INFO][3861] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.133 [INFO][3861] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.282 [INFO][3891] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.283 [INFO][3891] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.298 [INFO][3891] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.359 [WARNING][3891] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.359 [INFO][3891] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.370 [INFO][3891] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.384411 env[1196]: 2024-12-13 16:06:04.376 [INFO][3861] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:04.385278 env[1196]: time="2024-12-13T16:06:04.385244389Z" level=info msg="TearDown network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" successfully" Dec 13 16:06:04.385373 env[1196]: time="2024-12-13T16:06:04.385353779Z" level=info msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" returns successfully" Dec 13 16:06:04.386332 env[1196]: time="2024-12-13T16:06:04.386168516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6gr9g,Uid:05bf7863-f02b-4d3c-ab7d-3fe4572189b7,Namespace:kube-system,Attempt:1,}" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.164 [INFO][3855] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.165 [INFO][3855] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" iface="eth0" netns="/var/run/netns/cni-ad253d09-9cd2-1a4c-d2e8-4bff07de604f" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.165 [INFO][3855] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" iface="eth0" netns="/var/run/netns/cni-ad253d09-9cd2-1a4c-d2e8-4bff07de604f" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.165 [INFO][3855] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" iface="eth0" netns="/var/run/netns/cni-ad253d09-9cd2-1a4c-d2e8-4bff07de604f" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.165 [INFO][3855] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.165 [INFO][3855] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.316 [INFO][3899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.316 [INFO][3899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.370 [INFO][3899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.393 [WARNING][3899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.394 [INFO][3899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.398 [INFO][3899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.404698 env[1196]: 2024-12-13 16:06:04.401 [INFO][3855] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:04.405970 env[1196]: time="2024-12-13T16:06:04.405925688Z" level=info msg="TearDown network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" successfully" Dec 13 16:06:04.406112 env[1196]: time="2024-12-13T16:06:04.406094048Z" level=info msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" returns successfully" Dec 13 16:06:04.406844 env[1196]: time="2024-12-13T16:06:04.406810977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-z8ppp,Uid:ece652b9-48a6-420c-83c1-9f79a0ccbe51,Namespace:calico-apiserver,Attempt:1,}" Dec 13 16:06:04.502479 kubelet[2001]: I1213 16:06:04.502420 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-57f4cc6794-q9wn7" podStartSLOduration=28.430734245 podStartE2EDuration="31.502392393s" podCreationTimestamp="2024-12-13 16:05:33 +0000 UTC" firstStartedPulling="2024-12-13 16:06:00.756855106 +0000 UTC m=+41.121029696" lastFinishedPulling="2024-12-13 16:06:03.828513203 +0000 UTC m=+44.192687844" observedRunningTime="2024-12-13 16:06:04.312753541 +0000 UTC m=+44.676928134" watchObservedRunningTime="2024-12-13 16:06:04.502392393 +0000 UTC m=+44.866567003" Dec 13 16:06:04.603909 systemd-networkd[1034]: calic962da6cafd: Link UP Dec 13 16:06:04.610850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 16:06:04.611078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic962da6cafd: link becomes ready Dec 13 16:06:04.611180 systemd-networkd[1034]: calic962da6cafd: Gained carrier Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.462 [INFO][3919] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0 calico-apiserver-74c7d785bf- calico-apiserver c4a59eaa-9273-486b-81f5-c8e41b40853e 783 0 2024-12-13 16:05:32 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74c7d785bf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com calico-apiserver-74c7d785bf-xn9gr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic962da6cafd [] []}} ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.462 [INFO][3919] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.518 [INFO][3963] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" HandleID="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.529 [INFO][3963] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" HandleID="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003107b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"calico-apiserver-74c7d785bf-xn9gr", "timestamp":"2024-12-13 16:06:04.518080424 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.529 [INFO][3963] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.529 [INFO][3963] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.529 [INFO][3963] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.531 [INFO][3963] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.546 [INFO][3963] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.554 [INFO][3963] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.556 [INFO][3963] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.559 [INFO][3963] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.559 [INFO][3963] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.561 [INFO][3963] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.566 [INFO][3963] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.591 [INFO][3963] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.132/26] block=192.168.62.128/26 handle="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.591 [INFO][3963] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.132/26] handle="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.591 [INFO][3963] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.648330 env[1196]: 2024-12-13 16:06:04.591 [INFO][3963] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.132/26] IPv6=[] ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" HandleID="k8s-pod-network.3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.596 [INFO][3919] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a59eaa-9273-486b-81f5-c8e41b40853e", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-74c7d785bf-xn9gr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic962da6cafd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.596 [INFO][3919] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.132/32] ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.596 [INFO][3919] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic962da6cafd ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.612 [INFO][3919] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.613 [INFO][3919] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a59eaa-9273-486b-81f5-c8e41b40853e", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c", Pod:"calico-apiserver-74c7d785bf-xn9gr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic962da6cafd", MAC:"aa:56:c3:9d:eb:22", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.650916 env[1196]: 2024-12-13 16:06:04.631 [INFO][3919] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-xn9gr" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:04.683000 audit[3996]: NETFILTER_CFG table=filter:108 family=2 entries=52 op=nft_register_chain pid=3996 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:04.683000 audit[3996]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7fff915be140 a2=0 a3=7fff915be12c items=0 ppid=3237 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.683000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:04.704436 env[1196]: time="2024-12-13T16:06:04.702612207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:04.704436 env[1196]: time="2024-12-13T16:06:04.702706254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:04.704436 env[1196]: time="2024-12-13T16:06:04.702718440Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:04.704436 env[1196]: time="2024-12-13T16:06:04.703484521Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c pid=4009 runtime=io.containerd.runc.v2 Dec 13 16:06:04.727604 systemd[1]: Started cri-containerd-3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c.scope. Dec 13 16:06:04.755450 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic49c4b4251a: link becomes ready Dec 13 16:06:04.755225 systemd-networkd[1034]: calic49c4b4251a: Link UP Dec 13 16:06:04.755412 systemd-networkd[1034]: calic49c4b4251a: Gained carrier Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.556 [INFO][3933] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0 calico-apiserver-74c7d785bf- calico-apiserver ece652b9-48a6-420c-83c1-9f79a0ccbe51 786 0 2024-12-13 16:05:32 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74c7d785bf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com calico-apiserver-74c7d785bf-z8ppp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic49c4b4251a [] []}} ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.556 [INFO][3933] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.669 [INFO][3980] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" HandleID="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.691 [INFO][3980] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" HandleID="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e5c30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"calico-apiserver-74c7d785bf-z8ppp", "timestamp":"2024-12-13 16:06:04.669279826 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.691 [INFO][3980] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.691 [INFO][3980] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.691 [INFO][3980] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.704 [INFO][3980] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.715 [INFO][3980] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.724 [INFO][3980] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.732 [INFO][3980] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.735 [INFO][3980] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.735 [INFO][3980] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.736 [INFO][3980] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.741 [INFO][3980] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.748 [INFO][3980] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.133/26] block=192.168.62.128/26 handle="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.748 [INFO][3980] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.133/26] handle="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.748 [INFO][3980] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.771134 env[1196]: 2024-12-13 16:06:04.748 [INFO][3980] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.133/26] IPv6=[] ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" HandleID="k8s-pod-network.788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.750 [INFO][3933] cni-plugin/k8s.go 386: Populated endpoint ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ece652b9-48a6-420c-83c1-9f79a0ccbe51", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-74c7d785bf-z8ppp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic49c4b4251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.750 [INFO][3933] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.133/32] ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.750 [INFO][3933] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic49c4b4251a ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.756 [INFO][3933] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.756 [INFO][3933] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ece652b9-48a6-420c-83c1-9f79a0ccbe51", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d", Pod:"calico-apiserver-74c7d785bf-z8ppp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic49c4b4251a", MAC:"c2:e3:48:d9:7d:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.771940 env[1196]: 2024-12-13 16:06:04.769 [INFO][3933] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d" Namespace="calico-apiserver" Pod="calico-apiserver-74c7d785bf-z8ppp" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit: BPF prog-id=181 op=LOAD Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4009 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366638333333323934383333666564643266643634613261323931 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4009 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366638333333323934383333666564643266643634613261323931 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit: BPF prog-id=182 op=LOAD Dec 13 16:06:04.785000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003cf020 items=0 ppid=4009 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366638333333323934383333666564643266643634613261323931 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.785000 audit: BPF prog-id=183 op=LOAD Dec 13 16:06:04.785000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003cf068 items=0 ppid=4009 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366638333333323934383333666564643266643634613261323931 Dec 13 16:06:04.785000 audit: BPF prog-id=183 op=UNLOAD Dec 13 16:06:04.786000 audit: BPF prog-id=182 op=UNLOAD Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.786000 audit: BPF prog-id=184 op=LOAD Dec 13 16:06:04.786000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cf478 items=0 ppid=4009 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366638333333323934383333666564643266643634613261323931 Dec 13 16:06:04.809920 env[1196]: time="2024-12-13T16:06:04.809847609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:04.810239 env[1196]: time="2024-12-13T16:06:04.809928299Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:04.810239 env[1196]: time="2024-12-13T16:06:04.809953986Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:04.810803 env[1196]: time="2024-12-13T16:06:04.810755873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d pid=4059 runtime=io.containerd.runc.v2 Dec 13 16:06:04.816000 audit[4056]: NETFILTER_CFG table=filter:109 family=2 entries=52 op=nft_register_chain pid=4056 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:04.816000 audit[4056]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7ffe391a97d0 a2=0 a3=7ffe391a97bc items=0 ppid=3237 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.816000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:04.840752 systemd[1]: Started cri-containerd-788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d.scope. Dec 13 16:06:04.871535 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia2575cfdd50: link becomes ready Dec 13 16:06:04.868106 systemd-networkd[1034]: calia2575cfdd50: Link UP Dec 13 16:06:04.870173 systemd-networkd[1034]: calia2575cfdd50: Gained carrier Dec 13 16:06:04.880073 env[1196]: time="2024-12-13T16:06:04.876815015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-xn9gr,Uid:c4a59eaa-9273-486b-81f5-c8e41b40853e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c\"" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.543 [INFO][3931] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0 coredns-6f6b679f8f- kube-system 05bf7863-f02b-4d3c-ab7d-3fe4572189b7 784 0 2024-12-13 16:05:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-3qt9m.gb1.brightbox.com coredns-6f6b679f8f-6gr9g eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia2575cfdd50 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.544 [INFO][3931] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.690 [INFO][3976] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" HandleID="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.706 [INFO][3976] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" HandleID="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed160), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-3qt9m.gb1.brightbox.com", "pod":"coredns-6f6b679f8f-6gr9g", "timestamp":"2024-12-13 16:06:04.690044099 +0000 UTC"}, Hostname:"srv-3qt9m.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.706 [INFO][3976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.748 [INFO][3976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.748 [INFO][3976] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3qt9m.gb1.brightbox.com' Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.800 [INFO][3976] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.811 [INFO][3976] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.823 [INFO][3976] ipam/ipam.go 489: Trying affinity for 192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.826 [INFO][3976] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.829 [INFO][3976] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.128/26 host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.829 [INFO][3976] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.128/26 handle="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.833 [INFO][3976] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589 Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.842 [INFO][3976] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.128/26 handle="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.853 [INFO][3976] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.134/26] block=192.168.62.128/26 handle="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.853 [INFO][3976] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.134/26] handle="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" host="srv-3qt9m.gb1.brightbox.com" Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.853 [INFO][3976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:04.893918 env[1196]: 2024-12-13 16:06:04.853 [INFO][3976] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.134/26] IPv6=[] ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" HandleID="k8s-pod-network.f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.859 [INFO][3931] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05bf7863-f02b-4d3c-ab7d-3fe4572189b7", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"", Pod:"coredns-6f6b679f8f-6gr9g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2575cfdd50", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.859 [INFO][3931] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.134/32] ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.859 [INFO][3931] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia2575cfdd50 ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.870 [INFO][3931] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.874 [INFO][3931] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05bf7863-f02b-4d3c-ab7d-3fe4572189b7", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589", Pod:"coredns-6f6b679f8f-6gr9g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2575cfdd50", MAC:"b6:a5:24:c0:5d:f0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:04.895311 env[1196]: 2024-12-13 16:06:04.892 [INFO][3931] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589" Namespace="kube-system" Pod="coredns-6f6b679f8f-6gr9g" WorkloadEndpoint="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.914000 audit: BPF prog-id=185 op=LOAD Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4059 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386664663639356230633165313637646632663338323733356465 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4059 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386664663639356230633165313637646632663338323733356465 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit: BPF prog-id=186 op=LOAD Dec 13 16:06:04.915000 audit[4070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e9e90 items=0 ppid=4059 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386664663639356230633165313637646632663338323733356465 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit: BPF prog-id=187 op=LOAD Dec 13 16:06:04.915000 audit[4070]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000e9ed8 items=0 ppid=4059 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386664663639356230633165313637646632663338323733356465 Dec 13 16:06:04.915000 audit: BPF prog-id=187 op=UNLOAD Dec 13 16:06:04.915000 audit: BPF prog-id=186 op=UNLOAD Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { perfmon } for pid=4070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit[4070]: AVC avc: denied { bpf } for pid=4070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.915000 audit: BPF prog-id=188 op=LOAD Dec 13 16:06:04.915000 audit[4070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f42e8 items=0 ppid=4059 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386664663639356230633165313637646632663338323733356465 Dec 13 16:06:04.919512 env[1196]: time="2024-12-13T16:06:04.914929261Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 16:06:04.919512 env[1196]: time="2024-12-13T16:06:04.914994289Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 16:06:04.919512 env[1196]: time="2024-12-13T16:06:04.915015245Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 16:06:04.920219 env[1196]: time="2024-12-13T16:06:04.920159832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589 pid=4113 runtime=io.containerd.runc.v2 Dec 13 16:06:04.947094 systemd[1]: Started cri-containerd-f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589.scope. Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.966000 audit: BPF prog-id=189 op=LOAD Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4113 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613332366433633630376362353031616332646364336335376534 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4113 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613332366433633630376362353031616332646364336335376534 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit: BPF prog-id=190 op=LOAD Dec 13 16:06:04.967000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e7a40 items=0 ppid=4113 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613332366433633630376362353031616332646364336335376534 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.967000 audit: BPF prog-id=191 op=LOAD Dec 13 16:06:04.967000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7a88 items=0 ppid=4113 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613332366433633630376362353031616332646364336335376534 Dec 13 16:06:04.967000 audit: BPF prog-id=191 op=UNLOAD Dec 13 16:06:04.969000 audit: BPF prog-id=190 op=UNLOAD Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:04.969000 audit: BPF prog-id=192 op=LOAD Dec 13 16:06:04.969000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e7e98 items=0 ppid=4113 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613332366433633630376362353031616332646364336335376534 Dec 13 16:06:04.970000 audit[4133]: NETFILTER_CFG table=filter:110 family=2 entries=48 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 16:06:04.970000 audit[4133]: SYSCALL arch=c000003e syscall=46 success=yes exit=23432 a0=3 a1=7ffd1ef4b760 a2=0 a3=7ffd1ef4b74c items=0 ppid=3237 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:04.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 16:06:04.990472 env[1196]: time="2024-12-13T16:06:04.990432524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74c7d785bf-z8ppp,Uid:ece652b9-48a6-420c-83c1-9f79a0ccbe51,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d\"" Dec 13 16:06:05.014406 env[1196]: time="2024-12-13T16:06:05.014364708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6gr9g,Uid:05bf7863-f02b-4d3c-ab7d-3fe4572189b7,Namespace:kube-system,Attempt:1,} returns sandbox id \"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589\"" Dec 13 16:06:05.017488 env[1196]: time="2024-12-13T16:06:05.017456159Z" level=info msg="CreateContainer within sandbox \"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 16:06:05.025658 env[1196]: time="2024-12-13T16:06:05.025617223Z" level=info msg="CreateContainer within sandbox \"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d5f1e5a863448d662d1e216f07be0c486d6fc4be2a5089dc2d3db2afd02c1391\"" Dec 13 16:06:05.026252 env[1196]: time="2024-12-13T16:06:05.026225228Z" level=info msg="StartContainer for \"d5f1e5a863448d662d1e216f07be0c486d6fc4be2a5089dc2d3db2afd02c1391\"" Dec 13 16:06:05.044295 systemd[1]: Started cri-containerd-d5f1e5a863448d662d1e216f07be0c486d6fc4be2a5089dc2d3db2afd02c1391.scope. Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.064000 audit: BPF prog-id=193 op=LOAD Dec 13 16:06:05.065000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.065000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4113 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663165356138363334343864363632643165323136663037626530 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4113 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663165356138363334343864363632643165323136663037626530 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.066000 audit: BPF prog-id=194 op=LOAD Dec 13 16:06:05.066000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0f30 items=0 ppid=4113 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663165356138363334343864363632643165323136663037626530 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.067000 audit: BPF prog-id=195 op=LOAD Dec 13 16:06:05.067000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0f78 items=0 ppid=4113 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663165356138363334343864363632643165323136663037626530 Dec 13 16:06:05.068000 audit: BPF prog-id=195 op=UNLOAD Dec 13 16:06:05.068000 audit: BPF prog-id=194 op=UNLOAD Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.068000 audit: BPF prog-id=196 op=LOAD Dec 13 16:06:05.068000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1388 items=0 ppid=4113 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663165356138363334343864363632643165323136663037626530 Dec 13 16:06:05.093028 env[1196]: time="2024-12-13T16:06:05.092988414Z" level=info msg="StartContainer for \"d5f1e5a863448d662d1e216f07be0c486d6fc4be2a5089dc2d3db2afd02c1391\" returns successfully" Dec 13 16:06:05.095657 systemd[1]: run-containerd-runc-k8s.io-5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35-runc.lKy2WD.mount: Deactivated successfully. Dec 13 16:06:05.095791 systemd[1]: run-netns-cni\x2d3e6dfa74\x2d3af6\x2d9690\x2d8482\x2df76256c0dfc3.mount: Deactivated successfully. Dec 13 16:06:05.095839 systemd[1]: run-netns-cni\x2dad253d09\x2d9cd2\x2d1a4c\x2dd2e8\x2d4bff07de604f.mount: Deactivated successfully. Dec 13 16:06:05.305000 audit[4193]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:05.305000 audit[4193]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe140e2770 a2=0 a3=7ffe140e275c items=0 ppid=2146 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:05.310000 audit[4193]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:05.310000 audit[4193]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe140e2770 a2=0 a3=7ffe140e275c items=0 ppid=2146 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:05.742595 env[1196]: time="2024-12-13T16:06:05.742548955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:05.744869 env[1196]: time="2024-12-13T16:06:05.744838427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:05.746737 env[1196]: time="2024-12-13T16:06:05.746712210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:05.760302 systemd-networkd[1034]: calic962da6cafd: Gained IPv6LL Dec 13 16:06:05.768553 env[1196]: time="2024-12-13T16:06:05.767370779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:05.768553 env[1196]: time="2024-12-13T16:06:05.767990814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 16:06:05.769908 env[1196]: time="2024-12-13T16:06:05.769730817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 16:06:05.771818 env[1196]: time="2024-12-13T16:06:05.771790337Z" level=info msg="CreateContainer within sandbox \"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 16:06:05.785506 env[1196]: time="2024-12-13T16:06:05.785473819Z" level=info msg="CreateContainer within sandbox \"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bb206dce7f0e15673cd2dde393191d53c3d0d6a78cb35f1e72683b2933d19f91\"" Dec 13 16:06:05.786259 env[1196]: time="2024-12-13T16:06:05.786237048Z" level=info msg="StartContainer for \"bb206dce7f0e15673cd2dde393191d53c3d0d6a78cb35f1e72683b2933d19f91\"" Dec 13 16:06:05.828964 systemd[1]: Started cri-containerd-bb206dce7f0e15673cd2dde393191d53c3d0d6a78cb35f1e72683b2933d19f91.scope. Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd908e1ca88 items=0 ppid=3660 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323036646365376630653135363733636432646465333933313931 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit: BPF prog-id=197 op=LOAD Dec 13 16:06:05.846000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022d5a8 items=0 ppid=3660 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323036646365376630653135363733636432646465333933313931 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit: BPF prog-id=198 op=LOAD Dec 13 16:06:05.846000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022d5f8 items=0 ppid=3660 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323036646365376630653135363733636432646465333933313931 Dec 13 16:06:05.846000 audit: BPF prog-id=198 op=UNLOAD Dec 13 16:06:05.846000 audit: BPF prog-id=197 op=UNLOAD Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { perfmon } for pid=4208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit[4208]: AVC avc: denied { bpf } for pid=4208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:05.846000 audit: BPF prog-id=199 op=LOAD Dec 13 16:06:05.846000 audit[4208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022d688 items=0 ppid=3660 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:05.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323036646365376630653135363733636432646465333933313931 Dec 13 16:06:05.862203 env[1196]: time="2024-12-13T16:06:05.862151681Z" level=info msg="StartContainer for \"bb206dce7f0e15673cd2dde393191d53c3d0d6a78cb35f1e72683b2933d19f91\" returns successfully" Dec 13 16:06:05.876522 systemd-networkd[1034]: calia2575cfdd50: Gained IPv6LL Dec 13 16:06:06.095598 systemd[1]: run-containerd-runc-k8s.io-bb206dce7f0e15673cd2dde393191d53c3d0d6a78cb35f1e72683b2933d19f91-runc.0gVB5C.mount: Deactivated successfully. Dec 13 16:06:06.301604 kubelet[2001]: I1213 16:06:06.301430 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-6gr9g" podStartSLOduration=43.301285248 podStartE2EDuration="43.301285248s" podCreationTimestamp="2024-12-13 16:05:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 16:06:05.290329641 +0000 UTC m=+45.654504326" watchObservedRunningTime="2024-12-13 16:06:06.301285248 +0000 UTC m=+46.665459952" Dec 13 16:06:06.320000 audit[4238]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:06.320000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcd3f32c60 a2=0 a3=7ffcd3f32c4c items=0 ppid=2146 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:06.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:06.333000 audit[4238]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:06.333000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcd3f32c60 a2=0 a3=7ffcd3f32c4c items=0 ppid=2146 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:06.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:06.772263 systemd-networkd[1034]: calic49c4b4251a: Gained IPv6LL Dec 13 16:06:09.108964 env[1196]: time="2024-12-13T16:06:09.108900014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.113105 env[1196]: time="2024-12-13T16:06:09.113018536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.115187 env[1196]: time="2024-12-13T16:06:09.115163527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.117507 env[1196]: time="2024-12-13T16:06:09.117481460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.119027 env[1196]: time="2024-12-13T16:06:09.118971300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 16:06:09.123663 env[1196]: time="2024-12-13T16:06:09.123641054Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 16:06:09.124880 env[1196]: time="2024-12-13T16:06:09.124853034Z" level=info msg="CreateContainer within sandbox \"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 16:06:09.151144 env[1196]: time="2024-12-13T16:06:09.151008144Z" level=info msg="CreateContainer within sandbox \"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f97cafde09bb2776aa0cfd70684e829455322e2ebbdf7227e97c5013a717d25c\"" Dec 13 16:06:09.153468 env[1196]: time="2024-12-13T16:06:09.152296600Z" level=info msg="StartContainer for \"f97cafde09bb2776aa0cfd70684e829455322e2ebbdf7227e97c5013a717d25c\"" Dec 13 16:06:09.184087 systemd[1]: Started cri-containerd-f97cafde09bb2776aa0cfd70684e829455322e2ebbdf7227e97c5013a717d25c.scope. Dec 13 16:06:09.221971 kernel: kauditd_printk_skb: 408 callbacks suppressed Dec 13 16:06:09.222211 kernel: audit: type=1400 audit(1734105969.217:1314): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.222252 kernel: audit: type=1400 audit(1734105969.217:1315): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.230714 kernel: audit: type=1400 audit(1734105969.217:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.230910 kernel: audit: type=1400 audit(1734105969.217:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.230984 kernel: audit: type=1400 audit(1734105969.217:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.235898 kernel: audit: type=1400 audit(1734105969.217:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.236177 kernel: audit: type=1400 audit(1734105969.217:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.254273 kernel: audit: type=1400 audit(1734105969.217:1321): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.254365 kernel: audit: type=1400 audit(1734105969.217:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.254403 kernel: audit: type=1400 audit(1734105969.221:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.221000 audit: BPF prog-id=200 op=LOAD Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4009 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376361666465303962623237373661613063666437303638346538 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4009 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376361666465303962623237373661613063666437303638346538 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit: BPF prog-id=201 op=LOAD Dec 13 16:06:09.223000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000265ed0 items=0 ppid=4009 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376361666465303962623237373661613063666437303638346538 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit: BPF prog-id=202 op=LOAD Dec 13 16:06:09.223000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000265f18 items=0 ppid=4009 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376361666465303962623237373661613063666437303638346538 Dec 13 16:06:09.223000 audit: BPF prog-id=202 op=UNLOAD Dec 13 16:06:09.223000 audit: BPF prog-id=201 op=UNLOAD Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.223000 audit: BPF prog-id=203 op=LOAD Dec 13 16:06:09.223000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca328 items=0 ppid=4009 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376361666465303962623237373661613063666437303638346538 Dec 13 16:06:09.292027 env[1196]: time="2024-12-13T16:06:09.291975688Z" level=info msg="StartContainer for \"f97cafde09bb2776aa0cfd70684e829455322e2ebbdf7227e97c5013a717d25c\" returns successfully" Dec 13 16:06:09.476873 env[1196]: time="2024-12-13T16:06:09.476825129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.477680 env[1196]: time="2024-12-13T16:06:09.477654299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.478876 env[1196]: time="2024-12-13T16:06:09.478850285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.479937 env[1196]: time="2024-12-13T16:06:09.479909559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:09.480542 env[1196]: time="2024-12-13T16:06:09.480514324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 16:06:09.485128 env[1196]: time="2024-12-13T16:06:09.485098548Z" level=info msg="CreateContainer within sandbox \"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 16:06:09.486690 env[1196]: time="2024-12-13T16:06:09.486663375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 16:06:09.496735 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2446668470.mount: Deactivated successfully. Dec 13 16:06:09.506467 env[1196]: time="2024-12-13T16:06:09.506428861Z" level=info msg="CreateContainer within sandbox \"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b852c991d02fc415cd74360410940dcc33ea2ac355b879f357d01462e427783f\"" Dec 13 16:06:09.507177 env[1196]: time="2024-12-13T16:06:09.507150805Z" level=info msg="StartContainer for \"b852c991d02fc415cd74360410940dcc33ea2ac355b879f357d01462e427783f\"" Dec 13 16:06:09.525695 systemd[1]: Started cri-containerd-b852c991d02fc415cd74360410940dcc33ea2ac355b879f357d01462e427783f.scope. Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.550000 audit: BPF prog-id=204 op=LOAD Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4059 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238353263393931643032666334313563643734333630343130393430 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4059 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238353263393931643032666334313563643734333630343130393430 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.551000 audit: BPF prog-id=205 op=LOAD Dec 13 16:06:09.551000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000305470 items=0 ppid=4059 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238353263393931643032666334313563643734333630343130393430 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.552000 audit: BPF prog-id=206 op=LOAD Dec 13 16:06:09.552000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003054b8 items=0 ppid=4059 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238353263393931643032666334313563643734333630343130393430 Dec 13 16:06:09.552000 audit: BPF prog-id=206 op=UNLOAD Dec 13 16:06:09.553000 audit: BPF prog-id=205 op=UNLOAD Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:09.553000 audit: BPF prog-id=207 op=LOAD Dec 13 16:06:09.553000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003058c8 items=0 ppid=4059 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:09.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238353263393931643032666334313563643734333630343130393430 Dec 13 16:06:09.590484 env[1196]: time="2024-12-13T16:06:09.590436872Z" level=info msg="StartContainer for \"b852c991d02fc415cd74360410940dcc33ea2ac355b879f357d01462e427783f\" returns successfully" Dec 13 16:06:10.373081 kubelet[2001]: I1213 16:06:10.372108 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74c7d785bf-xn9gr" podStartSLOduration=34.132864572 podStartE2EDuration="38.372076624s" podCreationTimestamp="2024-12-13 16:05:32 +0000 UTC" firstStartedPulling="2024-12-13 16:06:04.881694065 +0000 UTC m=+45.245868663" lastFinishedPulling="2024-12-13 16:06:09.120906069 +0000 UTC m=+49.485080715" observedRunningTime="2024-12-13 16:06:10.325837837 +0000 UTC m=+50.690012454" watchObservedRunningTime="2024-12-13 16:06:10.372076624 +0000 UTC m=+50.736251239" Dec 13 16:06:10.406000 audit[4320]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:10.406000 audit[4320]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffed8fd3280 a2=0 a3=7ffed8fd326c items=0 ppid=2146 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:10.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:10.413000 audit[4320]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:10.413000 audit[4320]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffed8fd3280 a2=0 a3=7ffed8fd326c items=0 ppid=2146 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:10.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:10.438000 audit[4322]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4322 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:10.438000 audit[4322]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffba04bb50 a2=0 a3=7fffba04bb3c items=0 ppid=2146 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:10.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:10.444000 audit[4322]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4322 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:10.444000 audit[4322]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffba04bb50 a2=0 a3=7fffba04bb3c items=0 ppid=2146 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:10.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:10.492000 audit[4259]: AVC avc: denied { watch } for pid=4259 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.2675302278/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c243,c541 tclass=file permissive=0 Dec 13 16:06:10.492000 audit[4259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bcdaa0 a2=fc6 a3=0 items=0 ppid=4009 pid=4259 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 key=(null) Dec 13 16:06:10.492000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:06:10.534958 kubelet[2001]: I1213 16:06:10.534779 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74c7d785bf-z8ppp" podStartSLOduration=34.04485593 podStartE2EDuration="38.534713408s" podCreationTimestamp="2024-12-13 16:05:32 +0000 UTC" firstStartedPulling="2024-12-13 16:06:04.991823656 +0000 UTC m=+45.355998246" lastFinishedPulling="2024-12-13 16:06:09.481681131 +0000 UTC m=+49.845855724" observedRunningTime="2024-12-13 16:06:10.372621953 +0000 UTC m=+50.736796564" watchObservedRunningTime="2024-12-13 16:06:10.534713408 +0000 UTC m=+50.898909734" Dec 13 16:06:10.872000 audit[4299]: AVC avc: denied { watch } for pid=4299 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.685949392/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c304 tclass=file permissive=0 Dec 13 16:06:10.872000 audit[4299]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00077bfe0 a2=fc6 a3=0 items=0 ppid=4059 pid=4299 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 key=(null) Dec 13 16:06:10.872000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:06:11.314588 kubelet[2001]: I1213 16:06:11.314539 2001 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 16:06:11.363565 env[1196]: time="2024-12-13T16:06:11.363438462Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:11.365840 env[1196]: time="2024-12-13T16:06:11.365790766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:11.368439 env[1196]: time="2024-12-13T16:06:11.368391546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:11.370314 env[1196]: time="2024-12-13T16:06:11.370282344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 16:06:11.370952 env[1196]: time="2024-12-13T16:06:11.370914681Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 16:06:11.376945 env[1196]: time="2024-12-13T16:06:11.376894890Z" level=info msg="CreateContainer within sandbox \"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 16:06:11.390661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3354965030.mount: Deactivated successfully. Dec 13 16:06:11.399063 env[1196]: time="2024-12-13T16:06:11.398991085Z" level=info msg="CreateContainer within sandbox \"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e1374e2ec2296a51bb81232122273d7d762be9203da908841ea90852e00a9066\"" Dec 13 16:06:11.401008 env[1196]: time="2024-12-13T16:06:11.400982182Z" level=info msg="StartContainer for \"e1374e2ec2296a51bb81232122273d7d762be9203da908841ea90852e00a9066\"" Dec 13 16:06:11.436097 systemd[1]: run-containerd-runc-k8s.io-e1374e2ec2296a51bb81232122273d7d762be9203da908841ea90852e00a9066-runc.rZx5bc.mount: Deactivated successfully. Dec 13 16:06:11.439965 systemd[1]: Started cri-containerd-e1374e2ec2296a51bb81232122273d7d762be9203da908841ea90852e00a9066.scope. Dec 13 16:06:11.465000 audit[4356]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:11.465000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9fe99ff0 a2=0 a3=7ffd9fe99fdc items=0 ppid=2146 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd071137b18 items=0 ppid=3660 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333734653265633232393661353162623831323332313232323733 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit: BPF prog-id=208 op=LOAD Dec 13 16:06:11.467000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002911c8 items=0 ppid=3660 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333734653265633232393661353162623831323332313232323733 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit: BPF prog-id=209 op=LOAD Dec 13 16:06:11.467000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000291218 items=0 ppid=3660 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333734653265633232393661353162623831323332313232323733 Dec 13 16:06:11.467000 audit: BPF prog-id=209 op=UNLOAD Dec 13 16:06:11.467000 audit: BPF prog-id=208 op=UNLOAD Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 16:06:11.467000 audit: BPF prog-id=210 op=LOAD Dec 13 16:06:11.467000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002912a8 items=0 ppid=3660 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333734653265633232393661353162623831323332313232323733 Dec 13 16:06:11.471000 audit[4356]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:11.471000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd9fe99ff0 a2=0 a3=7ffd9fe99fdc items=0 ppid=2146 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:11.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:11.499433 env[1196]: time="2024-12-13T16:06:11.499390837Z" level=info msg="StartContainer for \"e1374e2ec2296a51bb81232122273d7d762be9203da908841ea90852e00a9066\" returns successfully" Dec 13 16:06:12.159500 kubelet[2001]: I1213 16:06:12.156741 2001 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 16:06:12.163172 kubelet[2001]: I1213 16:06:12.163145 2001 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 16:06:12.353516 kubelet[2001]: I1213 16:06:12.353425 2001 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-f4j6p" podStartSLOduration=30.4691125 podStartE2EDuration="39.353242449s" podCreationTimestamp="2024-12-13 16:05:33 +0000 UTC" firstStartedPulling="2024-12-13 16:06:02.488569124 +0000 UTC m=+42.852743719" lastFinishedPulling="2024-12-13 16:06:11.372699055 +0000 UTC m=+51.736873668" observedRunningTime="2024-12-13 16:06:12.343296179 +0000 UTC m=+52.707470780" watchObservedRunningTime="2024-12-13 16:06:12.353242449 +0000 UTC m=+52.717417066" Dec 13 16:06:14.614880 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 16:06:14.615185 kernel: audit: type=1400 audit(1734105974.609:1364): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:14.609000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:14.620168 kernel: audit: type=1300 audit(1734105974.609:1364): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fffde0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:14.609000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fffde0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:14.609000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:14.610000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:14.628081 kernel: audit: type=1327 audit(1734105974.609:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:14.628210 kernel: audit: type=1400 audit(1734105974.610:1365): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:14.628482 kernel: audit: type=1300 audit(1734105974.610:1365): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024fe1b0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:14.610000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024fe1b0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:14.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:14.636617 kernel: audit: type=1327 audit(1734105974.610:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:15.795000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.817079 kernel: audit: type=1400 audit(1734105975.795:1366): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.796000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.796000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00762c480 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.825438 kernel: audit: type=1400 audit(1734105975.796:1367): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.825540 kernel: audit: type=1300 audit(1734105975.796:1367): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00762c480 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.825886 kernel: audit: type=1327 audit(1734105975.796:1367): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.795000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c007784960 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.795000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.796000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.796000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef710c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.796000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526355 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.796000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00762c540 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.816000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.816000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f3ab4a0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:15.816000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:15.816000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c007784a50 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:06:15.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:06:19.944915 env[1196]: time="2024-12-13T16:06:19.944776004Z" level=info msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.058 [WARNING][4388] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0", GenerateName:"calico-kube-controllers-57f4cc6794-", Namespace:"calico-system", SelfLink:"", UID:"57885635-5e13-4531-867e-ee2bfa2b2c48", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57f4cc6794", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f", Pod:"calico-kube-controllers-57f4cc6794-q9wn7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4477c37884d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.060 [INFO][4388] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.060 [INFO][4388] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" iface="eth0" netns="" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.060 [INFO][4388] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.060 [INFO][4388] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.115 [INFO][4394] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.115 [INFO][4394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.115 [INFO][4394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.129 [WARNING][4394] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.130 [INFO][4394] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.137 [INFO][4394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.146704 env[1196]: 2024-12-13 16:06:20.142 [INFO][4388] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.147900 env[1196]: time="2024-12-13T16:06:20.147832702Z" level=info msg="TearDown network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" successfully" Dec 13 16:06:20.148011 env[1196]: time="2024-12-13T16:06:20.147994004Z" level=info msg="StopPodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" returns successfully" Dec 13 16:06:20.149640 env[1196]: time="2024-12-13T16:06:20.149604172Z" level=info msg="RemovePodSandbox for \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" Dec 13 16:06:20.149869 env[1196]: time="2024-12-13T16:06:20.149808623Z" level=info msg="Forcibly stopping sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\"" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.207 [WARNING][4414] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0", GenerateName:"calico-kube-controllers-57f4cc6794-", Namespace:"calico-system", SelfLink:"", UID:"57885635-5e13-4531-867e-ee2bfa2b2c48", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57f4cc6794", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"e682a3752a30b3065aa5f34a6a0d97b221cb6ab9089bc9925c1e50cc0b69565f", Pod:"calico-kube-controllers-57f4cc6794-q9wn7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4477c37884d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.207 [INFO][4414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.207 [INFO][4414] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" iface="eth0" netns="" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.207 [INFO][4414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.207 [INFO][4414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.241 [INFO][4420] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.241 [INFO][4420] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.241 [INFO][4420] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.249 [WARNING][4420] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.249 [INFO][4420] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" HandleID="k8s-pod-network.f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--kube--controllers--57f4cc6794--q9wn7-eth0" Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.251 [INFO][4420] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.255728 env[1196]: 2024-12-13 16:06:20.253 [INFO][4414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a" Dec 13 16:06:20.257705 env[1196]: time="2024-12-13T16:06:20.256671843Z" level=info msg="TearDown network for sandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" successfully" Dec 13 16:06:20.260654 env[1196]: time="2024-12-13T16:06:20.260618182Z" level=info msg="RemovePodSandbox \"f830df526b8fb0be85eadfa21d8532803f80d3731c1eef6e21f2257958bc257a\" returns successfully" Dec 13 16:06:20.267195 env[1196]: time="2024-12-13T16:06:20.267166933Z" level=info msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.313 [WARNING][4440] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a59eaa-9273-486b-81f5-c8e41b40853e", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c", Pod:"calico-apiserver-74c7d785bf-xn9gr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic962da6cafd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.313 [INFO][4440] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.313 [INFO][4440] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" iface="eth0" netns="" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.313 [INFO][4440] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.313 [INFO][4440] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.337 [INFO][4447] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.337 [INFO][4447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.337 [INFO][4447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.344 [WARNING][4447] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.344 [INFO][4447] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.346 [INFO][4447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.349974 env[1196]: 2024-12-13 16:06:20.347 [INFO][4440] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.351651 env[1196]: time="2024-12-13T16:06:20.351578796Z" level=info msg="TearDown network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" successfully" Dec 13 16:06:20.351885 env[1196]: time="2024-12-13T16:06:20.351844630Z" level=info msg="StopPodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" returns successfully" Dec 13 16:06:20.352711 env[1196]: time="2024-12-13T16:06:20.352671556Z" level=info msg="RemovePodSandbox for \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" Dec 13 16:06:20.352884 env[1196]: time="2024-12-13T16:06:20.352710593Z" level=info msg="Forcibly stopping sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\"" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.413 [WARNING][4467] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4a59eaa-9273-486b-81f5-c8e41b40853e", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"3c6f8333294833fedd2fd64a2a291af74c83994dfc0d10bb4f64479e0f77cc4c", Pod:"calico-apiserver-74c7d785bf-xn9gr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic962da6cafd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.413 [INFO][4467] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.413 [INFO][4467] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" iface="eth0" netns="" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.413 [INFO][4467] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.413 [INFO][4467] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.460 [INFO][4473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.465 [INFO][4473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.465 [INFO][4473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.473 [WARNING][4473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.473 [INFO][4473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" HandleID="k8s-pod-network.5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--xn9gr-eth0" Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.477 [INFO][4473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.484089 env[1196]: 2024-12-13 16:06:20.481 [INFO][4467] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c" Dec 13 16:06:20.484089 env[1196]: time="2024-12-13T16:06:20.483948812Z" level=info msg="TearDown network for sandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" successfully" Dec 13 16:06:20.486923 env[1196]: time="2024-12-13T16:06:20.486892750Z" level=info msg="RemovePodSandbox \"5c7ea2f3d5308ec3caf276f07639b161a785475e852cf1cd53cf46fd5e2d758c\" returns successfully" Dec 13 16:06:20.487663 env[1196]: time="2024-12-13T16:06:20.487630729Z" level=info msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.536 [WARNING][4492] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80", Pod:"coredns-6f6b679f8f-48scs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9d28639e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.536 [INFO][4492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.536 [INFO][4492] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" iface="eth0" netns="" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.536 [INFO][4492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.536 [INFO][4492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.558 [INFO][4500] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.558 [INFO][4500] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.558 [INFO][4500] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.567 [WARNING][4500] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.567 [INFO][4500] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.571 [INFO][4500] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.578853 env[1196]: 2024-12-13 16:06:20.575 [INFO][4492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.580378 env[1196]: time="2024-12-13T16:06:20.579908627Z" level=info msg="TearDown network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" successfully" Dec 13 16:06:20.580378 env[1196]: time="2024-12-13T16:06:20.579965663Z" level=info msg="StopPodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" returns successfully" Dec 13 16:06:20.581423 env[1196]: time="2024-12-13T16:06:20.581386707Z" level=info msg="RemovePodSandbox for \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" Dec 13 16:06:20.581770 env[1196]: time="2024-12-13T16:06:20.581627036Z" level=info msg="Forcibly stopping sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\"" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.643 [WARNING][4521] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"88f6eb05-bf67-44f8-9027-6bf2ed6d5cbb", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"d1074677123ff83b429f44234ede2d98d1fa182aefca8dfc1207295941ee6e80", Pod:"coredns-6f6b679f8f-48scs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7a9d28639e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.644 [INFO][4521] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.644 [INFO][4521] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" iface="eth0" netns="" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.644 [INFO][4521] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.644 [INFO][4521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.668 [INFO][4527] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.669 [INFO][4527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.669 [INFO][4527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.675 [WARNING][4527] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.675 [INFO][4527] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" HandleID="k8s-pod-network.470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--48scs-eth0" Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.677 [INFO][4527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.680977 env[1196]: 2024-12-13 16:06:20.679 [INFO][4521] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901" Dec 13 16:06:20.681845 env[1196]: time="2024-12-13T16:06:20.681799021Z" level=info msg="TearDown network for sandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" successfully" Dec 13 16:06:20.684716 env[1196]: time="2024-12-13T16:06:20.684661125Z" level=info msg="RemovePodSandbox \"470696c9fde92a77beff7edec50ed055fd0677864e234cff14e3c70d5001d901\" returns successfully" Dec 13 16:06:20.685523 env[1196]: time="2024-12-13T16:06:20.685500129Z" level=info msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.728 [WARNING][4545] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05bf7863-f02b-4d3c-ab7d-3fe4572189b7", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589", Pod:"coredns-6f6b679f8f-6gr9g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2575cfdd50", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.728 [INFO][4545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.728 [INFO][4545] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" iface="eth0" netns="" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.729 [INFO][4545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.729 [INFO][4545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.753 [INFO][4556] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.754 [INFO][4556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.754 [INFO][4556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.761 [WARNING][4556] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.761 [INFO][4556] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.763 [INFO][4556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.771605 env[1196]: 2024-12-13 16:06:20.767 [INFO][4545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.773816 env[1196]: time="2024-12-13T16:06:20.773076955Z" level=info msg="TearDown network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" successfully" Dec 13 16:06:20.774062 env[1196]: time="2024-12-13T16:06:20.773992614Z" level=info msg="StopPodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" returns successfully" Dec 13 16:06:20.775295 env[1196]: time="2024-12-13T16:06:20.775197089Z" level=info msg="RemovePodSandbox for \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" Dec 13 16:06:20.775508 env[1196]: time="2024-12-13T16:06:20.775300637Z" level=info msg="Forcibly stopping sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\"" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.829 [WARNING][4576] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05bf7863-f02b-4d3c-ab7d-3fe4572189b7", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"f7a326d3c607cb501ac2dcd3c57e468edf3c0f4fc6e51f9c94f649de990c1589", Pod:"coredns-6f6b679f8f-6gr9g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2575cfdd50", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.829 [INFO][4576] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.829 [INFO][4576] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" iface="eth0" netns="" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.829 [INFO][4576] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.829 [INFO][4576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.874 [INFO][4582] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.874 [INFO][4582] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.874 [INFO][4582] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.889 [WARNING][4582] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.890 [INFO][4582] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" HandleID="k8s-pod-network.827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Workload="srv--3qt9m.gb1.brightbox.com-k8s-coredns--6f6b679f8f--6gr9g-eth0" Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.893 [INFO][4582] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:20.898831 env[1196]: 2024-12-13 16:06:20.896 [INFO][4576] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9" Dec 13 16:06:20.898831 env[1196]: time="2024-12-13T16:06:20.898737831Z" level=info msg="TearDown network for sandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" successfully" Dec 13 16:06:20.913957 env[1196]: time="2024-12-13T16:06:20.913869290Z" level=info msg="RemovePodSandbox \"827e095ee7769890de5480faa5c0ce0d0f105a0f329ecb81080256c5d81ccda9\" returns successfully" Dec 13 16:06:20.915339 env[1196]: time="2024-12-13T16:06:20.915274669Z" level=info msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.961 [WARNING][4601] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a", Pod:"csi-node-driver-f4j6p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaafd46b86c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.961 [INFO][4601] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.961 [INFO][4601] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" iface="eth0" netns="" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.961 [INFO][4601] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.961 [INFO][4601] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.984 [INFO][4608] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.984 [INFO][4608] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.984 [INFO][4608] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.998 [WARNING][4608] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:20.998 [INFO][4608] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:21.001 [INFO][4608] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:21.004721 env[1196]: 2024-12-13 16:06:21.002 [INFO][4601] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.006343 env[1196]: time="2024-12-13T16:06:21.005903842Z" level=info msg="TearDown network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" successfully" Dec 13 16:06:21.006343 env[1196]: time="2024-12-13T16:06:21.005955918Z" level=info msg="StopPodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" returns successfully" Dec 13 16:06:21.007198 env[1196]: time="2024-12-13T16:06:21.007152447Z" level=info msg="RemovePodSandbox for \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" Dec 13 16:06:21.007313 env[1196]: time="2024-12-13T16:06:21.007204151Z" level=info msg="Forcibly stopping sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\"" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.053 [WARNING][4627] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7fa6fe39-063b-46d4-b2c6-3e9cbcebbc8e", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"2f3f35c43d524aedb878748f70a96dd66863d261a5d71712065ca5d859f5d09a", Pod:"csi-node-driver-f4j6p", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaafd46b86c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.054 [INFO][4627] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.054 [INFO][4627] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" iface="eth0" netns="" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.054 [INFO][4627] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.054 [INFO][4627] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.084 [INFO][4633] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.085 [INFO][4633] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.085 [INFO][4633] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.095 [WARNING][4633] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.095 [INFO][4633] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" HandleID="k8s-pod-network.9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Workload="srv--3qt9m.gb1.brightbox.com-k8s-csi--node--driver--f4j6p-eth0" Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.099 [INFO][4633] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:21.107224 env[1196]: 2024-12-13 16:06:21.103 [INFO][4627] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721" Dec 13 16:06:21.108246 env[1196]: time="2024-12-13T16:06:21.107263183Z" level=info msg="TearDown network for sandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" successfully" Dec 13 16:06:21.110527 env[1196]: time="2024-12-13T16:06:21.110365164Z" level=info msg="RemovePodSandbox \"9776c4211bdca61f1827f7f96a3844fd96ec1a955bacec336d476d7672cc1721\" returns successfully" Dec 13 16:06:21.111212 env[1196]: time="2024-12-13T16:06:21.111156588Z" level=info msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.168 [WARNING][4651] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ece652b9-48a6-420c-83c1-9f79a0ccbe51", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d", Pod:"calico-apiserver-74c7d785bf-z8ppp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic49c4b4251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.169 [INFO][4651] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.169 [INFO][4651] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" iface="eth0" netns="" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.169 [INFO][4651] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.169 [INFO][4651] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.202 [INFO][4657] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.203 [INFO][4657] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.203 [INFO][4657] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.218 [WARNING][4657] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.219 [INFO][4657] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.220 [INFO][4657] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:21.225269 env[1196]: 2024-12-13 16:06:21.223 [INFO][4651] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.226718 env[1196]: time="2024-12-13T16:06:21.225866451Z" level=info msg="TearDown network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" successfully" Dec 13 16:06:21.226718 env[1196]: time="2024-12-13T16:06:21.225915250Z" level=info msg="StopPodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" returns successfully" Dec 13 16:06:21.226718 env[1196]: time="2024-12-13T16:06:21.226668120Z" level=info msg="RemovePodSandbox for \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" Dec 13 16:06:21.226840 env[1196]: time="2024-12-13T16:06:21.226712240Z" level=info msg="Forcibly stopping sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\"" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.291 [WARNING][4675] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0", GenerateName:"calico-apiserver-74c7d785bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ece652b9-48a6-420c-83c1-9f79a0ccbe51", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 16, 5, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74c7d785bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3qt9m.gb1.brightbox.com", ContainerID:"788fdf695b0c1e167df2f382735dee7f1a806628b3594336846e2c37e489ce0d", Pod:"calico-apiserver-74c7d785bf-z8ppp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic49c4b4251a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.292 [INFO][4675] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.292 [INFO][4675] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" iface="eth0" netns="" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.293 [INFO][4675] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.293 [INFO][4675] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.327 [INFO][4681] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.327 [INFO][4681] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.327 [INFO][4681] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.336 [WARNING][4681] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.336 [INFO][4681] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" HandleID="k8s-pod-network.33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Workload="srv--3qt9m.gb1.brightbox.com-k8s-calico--apiserver--74c7d785bf--z8ppp-eth0" Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.340 [INFO][4681] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 16:06:21.346315 env[1196]: 2024-12-13 16:06:21.342 [INFO][4675] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093" Dec 13 16:06:21.347808 env[1196]: time="2024-12-13T16:06:21.346709629Z" level=info msg="TearDown network for sandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" successfully" Dec 13 16:06:21.351872 env[1196]: time="2024-12-13T16:06:21.351818896Z" level=info msg="RemovePodSandbox \"33ca0835d694b82814e9267634e2a86840e75571f50431d52643fcfe3588b093\" returns successfully" Dec 13 16:06:21.655000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.656410 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 16:06:21.656525 kernel: audit: type=1400 audit(1734105981.655:1373): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.655000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.655000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c20a0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.672159 kernel: audit: type=1400 audit(1734105981.655:1372): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.672245 kernel: audit: type=1300 audit(1734105981.655:1372): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c20a0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.672277 kernel: audit: type=1327 audit(1734105981.655:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.655000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fec620 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.680442 kernel: audit: type=1300 audit(1734105981.655:1373): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fec620 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.680503 kernel: audit: type=1327 audit(1734105981.655:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.655000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.687734 kernel: audit: type=1400 audit(1734105981.655:1374): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.687809 kernel: audit: type=1300 audit(1734105981.655:1374): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fec640 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.655000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fec640 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.660000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.699287 kernel: audit: type=1327 audit(1734105981.655:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:21.699350 kernel: audit: type=1400 audit(1734105981.660:1375): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:06:21.660000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c2240 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:06:21.660000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:06:22.022356 systemd[1]: run-containerd-runc-k8s.io-5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35-runc.dyhyyT.mount: Deactivated successfully. Dec 13 16:06:25.309620 kubelet[2001]: I1213 16:06:25.309491 2001 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 16:06:25.364000 audit[4710]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:25.364000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcc245fa10 a2=0 a3=7ffcc245f9fc items=0 ppid=2146 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:25.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:25.369000 audit[4710]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:06:25.369000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc245fa10 a2=0 a3=7ffcc245f9fc items=0 ppid=2146 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:25.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:06:26.952096 systemd[1]: run-containerd-runc-k8s.io-6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7-runc.7XQeZR.mount: Deactivated successfully. Dec 13 16:06:33.280925 systemd[1]: Started sshd@9-10.244.95.154:22-139.178.68.195:33108.service. Dec 13 16:06:33.289310 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 16:06:33.289774 kernel: audit: type=1130 audit(1734105993.281:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.154:22-139.178.68.195:33108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:33.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.154:22-139.178.68.195:33108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:34.246000 audit[4740]: USER_ACCT pid=4740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.260452 kernel: audit: type=1101 audit(1734105994.246:1379): pid=4740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.260520 sshd[4740]: Accepted publickey for core from 139.178.68.195 port 33108 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:34.261428 sshd[4740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:34.258000 audit[4740]: CRED_ACQ pid=4740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.271272 kernel: audit: type=1103 audit(1734105994.258:1380): pid=4740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.275063 kernel: audit: type=1006 audit(1734105994.258:1381): pid=4740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 16:06:34.258000 audit[4740]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9a175030 a2=3 a3=0 items=0 ppid=1 pid=4740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:34.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:34.281128 kernel: audit: type=1300 audit(1734105994.258:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9a175030 a2=3 a3=0 items=0 ppid=1 pid=4740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:34.281193 kernel: audit: type=1327 audit(1734105994.258:1381): proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:34.289042 systemd-logind[1190]: New session 10 of user core. Dec 13 16:06:34.290080 systemd[1]: Started session-10.scope. Dec 13 16:06:34.297000 audit[4740]: USER_START pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.306286 kernel: audit: type=1105 audit(1734105994.297:1382): pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.306358 kernel: audit: type=1103 audit(1734105994.297:1383): pid=4764 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:34.297000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:35.457943 sshd[4740]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:35.467154 kernel: audit: type=1106 audit(1734105995.459:1384): pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:35.459000 audit[4740]: USER_END pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:35.463017 systemd[1]: sshd@9-10.244.95.154:22-139.178.68.195:33108.service: Deactivated successfully. Dec 13 16:06:35.466786 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 16:06:35.467960 systemd-logind[1190]: Session 10 logged out. Waiting for processes to exit. Dec 13 16:06:35.469158 systemd-logind[1190]: Removed session 10. Dec 13 16:06:35.459000 audit[4740]: CRED_DISP pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:35.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.154:22-139.178.68.195:33108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:35.474341 kernel: audit: type=1104 audit(1734105995.459:1385): pid=4740 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:40.609999 systemd[1]: Started sshd@10-10.244.95.154:22-139.178.68.195:57826.service. Dec 13 16:06:40.613291 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 16:06:40.613376 kernel: audit: type=1130 audit(1734106000.610:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.154:22-139.178.68.195:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:40.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.154:22-139.178.68.195:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:41.530000 audit[4778]: USER_ACCT pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.534973 sshd[4778]: Accepted publickey for core from 139.178.68.195 port 57826 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:41.541108 kernel: audit: type=1101 audit(1734106001.530:1388): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.542566 sshd[4778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:41.540000 audit[4778]: CRED_ACQ pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.555916 kernel: audit: type=1103 audit(1734106001.540:1389): pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.555982 kernel: audit: type=1006 audit(1734106001.540:1390): pid=4778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 16:06:41.540000 audit[4778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec0832670 a2=3 a3=0 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:41.560116 kernel: audit: type=1300 audit(1734106001.540:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec0832670 a2=3 a3=0 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:41.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:41.565535 kernel: audit: type=1327 audit(1734106001.540:1390): proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:41.568854 systemd-logind[1190]: New session 11 of user core. Dec 13 16:06:41.571525 systemd[1]: Started session-11.scope. Dec 13 16:06:41.576000 audit[4778]: USER_START pid=4778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.582085 kernel: audit: type=1105 audit(1734106001.576:1391): pid=4778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.585157 kernel: audit: type=1103 audit(1734106001.581:1392): pid=4786 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.581000 audit[4786]: CRED_ACQ pid=4786 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:41.678312 systemd[1]: Started sshd@11-10.244.95.154:22-218.92.0.198:18860.service. Dec 13 16:06:41.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.154:22-218.92.0.198:18860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:41.685071 kernel: audit: type=1130 audit(1734106001.677:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.154:22-218.92.0.198:18860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:42.320846 sshd[4778]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:42.321000 audit[4778]: USER_END pid=4778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:42.332201 systemd[1]: sshd@10-10.244.95.154:22-139.178.68.195:57826.service: Deactivated successfully. Dec 13 16:06:42.334777 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 16:06:42.335279 kernel: audit: type=1106 audit(1734106002.321:1394): pid=4778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:42.322000 audit[4778]: CRED_DISP pid=4778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:42.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.154:22-139.178.68.195:57826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:42.336383 systemd-logind[1190]: Session 11 logged out. Waiting for processes to exit. Dec 13 16:06:42.337399 systemd-logind[1190]: Removed session 11. Dec 13 16:06:43.191170 sshd[4788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:06:43.190000 audit[4788]: USER_AUTH pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:45.381871 sshd[4788]: Failed password for root from 218.92.0.198 port 18860 ssh2 Dec 13 16:06:45.698000 audit[4788]: USER_AUTH pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:45.702222 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 16:06:45.702457 kernel: audit: type=1100 audit(1734106005.698:1398): pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:47.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.154:22-139.178.68.195:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:47.473112 systemd[1]: Started sshd@12-10.244.95.154:22-139.178.68.195:52058.service. Dec 13 16:06:47.479660 kernel: audit: type=1130 audit(1734106007.472:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.154:22-139.178.68.195:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:47.500199 sshd[4788]: Failed password for root from 218.92.0.198 port 18860 ssh2 Dec 13 16:06:48.207000 audit[4788]: USER_AUTH pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:48.218075 kernel: audit: type=1100 audit(1734106008.207:1400): pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:48.376000 audit[4802]: USER_ACCT pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.380914 sshd[4802]: Accepted publickey for core from 139.178.68.195 port 52058 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:48.387099 kernel: audit: type=1101 audit(1734106008.376:1401): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.386000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.401343 sshd[4802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:48.403275 kernel: audit: type=1103 audit(1734106008.386:1402): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.403339 kernel: audit: type=1006 audit(1734106008.386:1403): pid=4802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 16:06:48.386000 audit[4802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a20cd30 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:48.407381 kernel: audit: type=1300 audit(1734106008.386:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a20cd30 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:48.386000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:48.409196 kernel: audit: type=1327 audit(1734106008.386:1403): proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:48.414430 systemd[1]: Started session-12.scope. Dec 13 16:06:48.414880 systemd-logind[1190]: New session 12 of user core. Dec 13 16:06:48.419000 audit[4802]: USER_START pid=4802 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.422000 audit[4804]: CRED_ACQ pid=4804 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.437577 kernel: audit: type=1105 audit(1734106008.419:1404): pid=4802 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:48.438475 kernel: audit: type=1103 audit(1734106008.422:1405): pid=4804 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:49.125287 sshd[4802]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:49.126000 audit[4802]: USER_END pid=4802 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:49.126000 audit[4802]: CRED_DISP pid=4802 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:49.130807 systemd-logind[1190]: Session 12 logged out. Waiting for processes to exit. Dec 13 16:06:49.131678 systemd[1]: sshd@12-10.244.95.154:22-139.178.68.195:52058.service: Deactivated successfully. Dec 13 16:06:49.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.154:22-139.178.68.195:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:49.133778 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 16:06:49.135247 systemd-logind[1190]: Removed session 12. Dec 13 16:06:49.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.95.154:22-139.178.68.195:52070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:49.280324 systemd[1]: Started sshd@13-10.244.95.154:22-139.178.68.195:52070.service. Dec 13 16:06:49.752520 sshd[4788]: Failed password for root from 218.92.0.198 port 18860 ssh2 Dec 13 16:06:50.209000 audit[4815]: USER_ACCT pid=4815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:50.211571 sshd[4815]: Accepted publickey for core from 139.178.68.195 port 52070 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:50.212000 audit[4815]: CRED_ACQ pid=4815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:50.213000 audit[4815]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff517c8450 a2=3 a3=0 items=0 ppid=1 pid=4815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:50.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:50.215928 sshd[4815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:50.226137 systemd-logind[1190]: New session 13 of user core. Dec 13 16:06:50.226526 systemd[1]: Started session-13.scope. Dec 13 16:06:50.231000 audit[4815]: USER_START pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:50.232000 audit[4817]: CRED_ACQ pid=4817 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:50.716700 sshd[4788]: Received disconnect from 218.92.0.198 port 18860:11: [preauth] Dec 13 16:06:50.716700 sshd[4788]: Disconnected from authenticating user root 218.92.0.198 port 18860 [preauth] Dec 13 16:06:50.716733 sshd[4788]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:06:50.726697 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 16:06:50.726810 kernel: audit: type=1131 audit(1734106010.717:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.154:22-218.92.0.198:18860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:50.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.154:22-218.92.0.198:18860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:50.717999 systemd[1]: sshd@11-10.244.95.154:22-218.92.0.198:18860.service: Deactivated successfully. Dec 13 16:06:50.952687 systemd[1]: Started sshd@14-10.244.95.154:22-218.92.0.198:17192.service. Dec 13 16:06:50.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.154:22-218.92.0.198:17192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:50.960166 kernel: audit: type=1130 audit(1734106010.953:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.154:22-218.92.0.198:17192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:51.022294 sshd[4815]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:51.026000 audit[4815]: USER_END pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:51.039064 kernel: audit: type=1106 audit(1734106011.026:1417): pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:51.026000 audit[4815]: CRED_DISP pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:51.039867 systemd-logind[1190]: Session 13 logged out. Waiting for processes to exit. Dec 13 16:06:51.041526 systemd[1]: sshd@13-10.244.95.154:22-139.178.68.195:52070.service: Deactivated successfully. Dec 13 16:06:51.042330 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 16:06:51.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.95.154:22-139.178.68.195:52070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:51.044206 systemd-logind[1190]: Removed session 13. Dec 13 16:06:51.047270 kernel: audit: type=1104 audit(1734106011.026:1418): pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:51.047337 kernel: audit: type=1131 audit(1734106011.038:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.95.154:22-139.178.68.195:52070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:51.169751 systemd[1]: Started sshd@15-10.244.95.154:22-139.178.68.195:52076.service. Dec 13 16:06:51.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.154:22-139.178.68.195:52076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:51.176167 kernel: audit: type=1130 audit(1734106011.168:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.154:22-139.178.68.195:52076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:52.064000 audit[4829]: USER_ACCT pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.065977 sshd[4829]: Accepted publickey for core from 139.178.68.195 port 52076 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:52.072140 kernel: audit: type=1101 audit(1734106012.064:1421): pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.077000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.079949 sshd[4829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:52.088188 kernel: audit: type=1103 audit(1734106012.077:1422): pid=4829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.088483 kernel: audit: type=1006 audit(1734106012.079:1423): pid=4829 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 16:06:52.088519 kernel: audit: type=1300 audit(1734106012.079:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd201bb4a0 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:52.079000 audit[4829]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd201bb4a0 a2=3 a3=0 items=0 ppid=1 pid=4829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:52.079000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:52.086745 systemd[1]: Started session-14.scope. Dec 13 16:06:52.087420 systemd-logind[1190]: New session 14 of user core. Dec 13 16:06:52.093000 audit[4829]: USER_START pid=4829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.095000 audit[4831]: CRED_ACQ pid=4831 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.464339 sshd[4825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:06:52.465000 audit[4825]: USER_AUTH pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:52.791316 sshd[4829]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:52.794000 audit[4829]: USER_END pid=4829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.795000 audit[4829]: CRED_DISP pid=4829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:52.800198 systemd[1]: sshd@15-10.244.95.154:22-139.178.68.195:52076.service: Deactivated successfully. Dec 13 16:06:52.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.154:22-139.178.68.195:52076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:52.801432 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 16:06:52.802750 systemd-logind[1190]: Session 14 logged out. Waiting for processes to exit. Dec 13 16:06:52.805218 systemd-logind[1190]: Removed session 14. Dec 13 16:06:54.225448 sshd[4825]: Failed password for root from 218.92.0.198 port 17192 ssh2 Dec 13 16:06:54.972064 sshd[4825]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 16:06:54.970000 audit[4825]: ANOM_LOGIN_FAILURES pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:54.971000 audit[4825]: USER_AUTH pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:56.672206 sshd[4825]: Failed password for root from 218.92.0.198 port 17192 ssh2 Dec 13 16:06:56.964330 systemd[1]: run-containerd-runc-k8s.io-6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7-runc.WmUYCF.mount: Deactivated successfully. Dec 13 16:06:57.479000 audit[4825]: USER_AUTH pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:57.492465 kernel: kauditd_printk_skb: 9 callbacks suppressed Dec 13 16:06:57.492699 kernel: audit: type=1100 audit(1734106017.479:1432): pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:06:57.948225 systemd[1]: Started sshd@16-10.244.95.154:22-139.178.68.195:57716.service. Dec 13 16:06:57.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.154:22-139.178.68.195:57716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:57.958459 kernel: audit: type=1130 audit(1734106017.948:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.154:22-139.178.68.195:57716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:58.867000 audit[4873]: USER_ACCT pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.869445 sshd[4873]: Accepted publickey for core from 139.178.68.195 port 57716 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:06:58.879122 kernel: audit: type=1101 audit(1734106018.867:1434): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.879000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.882300 sshd[4873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:06:58.887317 kernel: audit: type=1103 audit(1734106018.879:1435): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.887513 kernel: audit: type=1006 audit(1734106018.879:1436): pid=4873 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 16:06:58.879000 audit[4873]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfa786cb0 a2=3 a3=0 items=0 ppid=1 pid=4873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:58.893679 kernel: audit: type=1300 audit(1734106018.879:1436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfa786cb0 a2=3 a3=0 items=0 ppid=1 pid=4873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:06:58.894980 kernel: audit: type=1327 audit(1734106018.879:1436): proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:58.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:06:58.899853 systemd[1]: Started session-15.scope. Dec 13 16:06:58.900480 systemd-logind[1190]: New session 15 of user core. Dec 13 16:06:58.905000 audit[4873]: USER_START pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.911629 kernel: audit: type=1105 audit(1734106018.905:1437): pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.911694 kernel: audit: type=1103 audit(1734106018.910:1438): pid=4875 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:58.910000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:59.259790 sshd[4825]: Failed password for root from 218.92.0.198 port 17192 ssh2 Dec 13 16:06:59.648181 sshd[4873]: pam_unix(sshd:session): session closed for user core Dec 13 16:06:59.650000 audit[4873]: USER_END pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:59.659219 kernel: audit: type=1106 audit(1734106019.650:1439): pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:59.655000 audit[4873]: CRED_DISP pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:06:59.659954 systemd-logind[1190]: Session 15 logged out. Waiting for processes to exit. Dec 13 16:06:59.662209 systemd[1]: sshd@16-10.244.95.154:22-139.178.68.195:57716.service: Deactivated successfully. Dec 13 16:06:59.663330 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 16:06:59.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.154:22-139.178.68.195:57716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:06:59.664647 systemd-logind[1190]: Removed session 15. Dec 13 16:07:00.477135 sshd[4825]: Received disconnect from 218.92.0.198 port 17192:11: [preauth] Dec 13 16:07:00.477135 sshd[4825]: Disconnected from authenticating user root 218.92.0.198 port 17192 [preauth] Dec 13 16:07:00.478273 sshd[4825]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:07:00.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.154:22-218.92.0.198:17192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:00.480781 systemd[1]: sshd@14-10.244.95.154:22-218.92.0.198:17192.service: Deactivated successfully. Dec 13 16:07:00.745462 systemd[1]: Started sshd@17-10.244.95.154:22-218.92.0.198:25932.service. Dec 13 16:07:00.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.95.154:22-218.92.0.198:25932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:03.307567 sshd[4887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:07:03.307000 audit[4887]: USER_AUTH pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:03.319263 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 16:07:03.319476 kernel: audit: type=1100 audit(1734106023.307:1444): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:03.922433 systemd[1]: run-containerd-runc-k8s.io-5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35-runc.dF1Xd9.mount: Deactivated successfully. Dec 13 16:07:04.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.154:22-139.178.68.195:57726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:04.801693 systemd[1]: Started sshd@18-10.244.95.154:22-139.178.68.195:57726.service. Dec 13 16:07:04.806799 kernel: audit: type=1130 audit(1734106024.802:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.154:22-139.178.68.195:57726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:05.244201 sshd[4887]: Failed password for root from 218.92.0.198 port 25932 ssh2 Dec 13 16:07:05.712000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.714119 sshd[4910]: Accepted publickey for core from 139.178.68.195 port 57726 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:05.724255 kernel: audit: type=1101 audit(1734106025.712:1446): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.724000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.727419 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:05.733401 kernel: audit: type=1103 audit(1734106025.724:1447): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.733545 kernel: audit: type=1006 audit(1734106025.725:1448): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 16:07:05.734252 kernel: audit: type=1300 audit(1734106025.725:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f1c7220 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:05.725000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f1c7220 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:05.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:05.745609 kernel: audit: type=1327 audit(1734106025.725:1448): proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:05.749379 systemd-logind[1190]: New session 16 of user core. Dec 13 16:07:05.750168 systemd[1]: Started session-16.scope. Dec 13 16:07:05.754000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.759000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.764134 kernel: audit: type=1105 audit(1734106025.754:1449): pid=4910 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.764206 kernel: audit: type=1103 audit(1734106025.759:1450): pid=4912 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:05.832000 audit[4887]: USER_AUTH pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:05.844083 kernel: audit: type=1100 audit(1734106025.832:1451): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:06.453625 sshd[4910]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:06.455000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:06.456000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:06.461015 systemd-logind[1190]: Session 16 logged out. Waiting for processes to exit. Dec 13 16:07:06.463460 systemd[1]: sshd@18-10.244.95.154:22-139.178.68.195:57726.service: Deactivated successfully. Dec 13 16:07:06.464448 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 16:07:06.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.154:22-139.178.68.195:57726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:06.465773 systemd-logind[1190]: Removed session 16. Dec 13 16:07:08.712306 sshd[4887]: Failed password for root from 218.92.0.198 port 25932 ssh2 Dec 13 16:07:10.495000 audit[4259]: AVC avc: denied { watch } for pid=4259 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.2675302278/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c243,c541 tclass=file permissive=0 Dec 13 16:07:10.502798 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 16:07:10.503191 kernel: audit: type=1400 audit(1734106030.495:1455): avc: denied { watch } for pid=4259 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.2675302278/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c243,c541 tclass=file permissive=0 Dec 13 16:07:10.495000 audit[4259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c3ba20 a2=fc6 a3=0 items=0 ppid=4009 pid=4259 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 key=(null) Dec 13 16:07:10.495000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:07:10.518700 kernel: audit: type=1300 audit(1734106030.495:1455): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c3ba20 a2=fc6 a3=0 items=0 ppid=4009 pid=4259 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c541 key=(null) Dec 13 16:07:10.518797 kernel: audit: type=1327 audit(1734106030.495:1455): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:07:10.633000 audit[4887]: USER_AUTH pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:10.640071 kernel: audit: type=1100 audit(1734106030.633:1456): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.198 addr=218.92.0.198 terminal=ssh res=failed' Dec 13 16:07:10.874000 audit[4299]: AVC avc: denied { watch } for pid=4299 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.685949392/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c304 tclass=file permissive=0 Dec 13 16:07:10.874000 audit[4299]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0017db4a0 a2=fc6 a3=0 items=0 ppid=4059 pid=4299 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 key=(null) Dec 13 16:07:10.894522 kernel: audit: type=1400 audit(1734106030.874:1457): avc: denied { watch } for pid=4299 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_16_05_48.685949392/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c304 tclass=file permissive=0 Dec 13 16:07:10.894653 kernel: audit: type=1300 audit(1734106030.874:1457): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0017db4a0 a2=fc6 a3=0 items=0 ppid=4059 pid=4299 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c304 key=(null) Dec 13 16:07:10.894766 kernel: audit: type=1327 audit(1734106030.874:1457): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:07:10.874000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 16:07:11.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.95.154:22-139.178.68.195:58438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:11.610743 systemd[1]: Started sshd@19-10.244.95.154:22-139.178.68.195:58438.service. Dec 13 16:07:11.619421 kernel: audit: type=1130 audit(1734106031.610:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.95.154:22-139.178.68.195:58438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:12.515000 audit[4922]: USER_ACCT pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.517654 sshd[4922]: Accepted publickey for core from 139.178.68.195 port 58438 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:12.521087 kernel: audit: type=1101 audit(1734106032.515:1459): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.523546 sshd[4922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:12.521000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.537159 kernel: audit: type=1103 audit(1734106032.521:1460): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.537901 systemd[1]: Started session-17.scope. Dec 13 16:07:12.539451 systemd-logind[1190]: New session 17 of user core. Dec 13 16:07:12.521000 audit[4922]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccc2bb9a0 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:12.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:12.543000 audit[4922]: USER_START pid=4922 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.545000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:12.864369 sshd[4887]: Failed password for root from 218.92.0.198 port 25932 ssh2 Dec 13 16:07:13.161219 sshd[4887]: Received disconnect from 218.92.0.198 port 25932:11: [preauth] Dec 13 16:07:13.161219 sshd[4887]: Disconnected from authenticating user root 218.92.0.198 port 25932 [preauth] Dec 13 16:07:13.161176 sshd[4887]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Dec 13 16:07:13.163467 systemd[1]: sshd@17-10.244.95.154:22-218.92.0.198:25932.service: Deactivated successfully. Dec 13 16:07:13.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.95.154:22-218.92.0.198:25932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:13.246925 sshd[4922]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:13.249000 audit[4922]: USER_END pid=4922 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:13.249000 audit[4922]: CRED_DISP pid=4922 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:13.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.95.154:22-139.178.68.195:58438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:13.252618 systemd[1]: sshd@19-10.244.95.154:22-139.178.68.195:58438.service: Deactivated successfully. Dec 13 16:07:13.254977 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 16:07:13.256435 systemd-logind[1190]: Session 17 logged out. Waiting for processes to exit. Dec 13 16:07:13.258176 systemd-logind[1190]: Removed session 17. Dec 13 16:07:13.395877 systemd[1]: Started sshd@20-10.244.95.154:22-139.178.68.195:58452.service. Dec 13 16:07:13.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.95.154:22-139.178.68.195:58452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:14.308000 audit[4935]: USER_ACCT pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:14.309948 sshd[4935]: Accepted publickey for core from 139.178.68.195 port 58452 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:14.311000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:14.312000 audit[4935]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff79371030 a2=3 a3=0 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:14.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:14.314432 sshd[4935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:14.328432 systemd-logind[1190]: New session 18 of user core. Dec 13 16:07:14.329719 systemd[1]: Started session-18.scope. Dec 13 16:07:14.338000 audit[4935]: USER_START pid=4935 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:14.340000 audit[4937]: CRED_ACQ pid=4937 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:14.618000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:14.618000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022ae960 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:14.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:14.620000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:14.620000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002215c00 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:14.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:15.236123 sshd[4935]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:15.240000 audit[4935]: USER_END pid=4935 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:15.240000 audit[4935]: CRED_DISP pid=4935 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:15.244142 systemd[1]: sshd@20-10.244.95.154:22-139.178.68.195:58452.service: Deactivated successfully. Dec 13 16:07:15.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.95.154:22-139.178.68.195:58452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:15.246179 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 16:07:15.247425 systemd-logind[1190]: Session 18 logged out. Waiting for processes to exit. Dec 13 16:07:15.249861 systemd-logind[1190]: Removed session 18. Dec 13 16:07:15.386156 systemd[1]: Started sshd@21-10.244.95.154:22-139.178.68.195:58458.service. Dec 13 16:07:15.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.95.154:22-139.178.68.195:58458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:15.806136 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 16:07:15.806507 kernel: audit: type=1400 audit(1734106035.800:1480): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.800000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.800000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.800000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00583f350 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.830652 kernel: audit: type=1400 audit(1734106035.800:1481): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.830826 kernel: audit: type=1300 audit(1734106035.800:1480): arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00583f350 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.830875 kernel: audit: type=1327 audit(1734106035.800:1480): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.835002 kernel: audit: type=1300 audit(1734106035.800:1481): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0059d02a0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.800000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0059d02a0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.843191 kernel: audit: type=1327 audit(1734106035.800:1481): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.843283 kernel: audit: type=1400 audit(1734106035.802:1482): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.802000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.846621 kernel: audit: type=1300 audit(1734106035.802:1482): arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c007624e40 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.802000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c007624e40 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.851090 kernel: audit: type=1327 audit(1734106035.802:1482): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.803000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526355 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.862544 kernel: audit: type=1400 audit(1734106035.803:1483): avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526355 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.803000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00583f4a0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.820000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.820000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00602e4e0 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:15.820000 audit[1848]: AVC avc: denied { watch } for pid=1848 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526359 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:15.820000 audit[1848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0059d0480 a2=fc6 a3=0 items=0 ppid=1718 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c1008 key=(null) Dec 13 16:07:15.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E313534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 16:07:16.307000 audit[4945]: USER_ACCT pid=4945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:16.309500 sshd[4945]: Accepted publickey for core from 139.178.68.195 port 58458 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:16.311000 audit[4945]: CRED_ACQ pid=4945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:16.311000 audit[4945]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc712e6f0 a2=3 a3=0 items=0 ppid=1 pid=4945 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:16.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:16.313484 sshd[4945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:16.325754 systemd-logind[1190]: New session 19 of user core. Dec 13 16:07:16.326756 systemd[1]: Started session-19.scope. Dec 13 16:07:16.332000 audit[4945]: USER_START pid=4945 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:16.335000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:19.384000 audit[4957]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:19.384000 audit[4957]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd8f129c10 a2=0 a3=7ffd8f129bfc items=0 ppid=2146 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:19.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:19.387000 audit[4957]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:19.387000 audit[4957]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8f129c10 a2=0 a3=0 items=0 ppid=2146 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:19.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:19.423000 audit[4959]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:19.423000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff4c573240 a2=0 a3=7fff4c57322c items=0 ppid=2146 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:19.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:19.429000 audit[4959]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:19.429000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff4c573240 a2=0 a3=0 items=0 ppid=2146 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:19.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:19.517177 sshd[4945]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:19.527000 audit[4945]: USER_END pid=4945 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:19.528000 audit[4945]: CRED_DISP pid=4945 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:19.546451 systemd[1]: sshd@21-10.244.95.154:22-139.178.68.195:58458.service: Deactivated successfully. Dec 13 16:07:19.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.95.154:22-139.178.68.195:58458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:19.547759 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 16:07:19.550524 systemd-logind[1190]: Session 19 logged out. Waiting for processes to exit. Dec 13 16:07:19.551621 systemd-logind[1190]: Removed session 19. Dec 13 16:07:19.660975 systemd[1]: Started sshd@22-10.244.95.154:22-139.178.68.195:47300.service. Dec 13 16:07:19.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.95.154:22-139.178.68.195:47300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:20.574000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:20.579322 sshd[4962]: Accepted publickey for core from 139.178.68.195 port 47300 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:20.579000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:20.580000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee60c540 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:20.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:20.583946 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:20.597190 systemd-logind[1190]: New session 20 of user core. Dec 13 16:07:20.600429 systemd[1]: Started session-20.scope. Dec 13 16:07:20.614000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:20.618000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:21.663032 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 16:07:21.663329 kernel: audit: type=1400 audit(1734106041.656:1504): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.667666 kernel: audit: type=1400 audit(1734106041.658:1505): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.656000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.658000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.658000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0031ec320 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.678058 kernel: audit: type=1300 audit(1734106041.658:1505): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0031ec320 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.685247 kernel: audit: type=1327 audit(1734106041.658:1505): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.688253 kernel: audit: type=1300 audit(1734106041.656:1504): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032f58c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.656000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032f58c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.703265 kernel: audit: type=1327 audit(1734106041.656:1504): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.669000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.669000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032f58e0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.712105 kernel: audit: type=1400 audit(1734106041.669:1506): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.712275 kernel: audit: type=1300 audit(1734106041.669:1506): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032f58e0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.716600 kernel: audit: type=1327 audit(1734106041.669:1506): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.717133 kernel: audit: type=1400 audit(1734106041.672:1507): avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.672000 audit[1871]: AVC avc: denied { watch } for pid=1871 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 16:07:21.672000 audit[1871]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031ec4c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c1022 key=(null) Dec 13 16:07:21.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 16:07:21.867149 sshd[4962]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:21.869000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:21.870000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:21.873514 systemd[1]: sshd@22-10.244.95.154:22-139.178.68.195:47300.service: Deactivated successfully. Dec 13 16:07:21.874990 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 16:07:21.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.95.154:22-139.178.68.195:47300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:21.876469 systemd-logind[1190]: Session 20 logged out. Waiting for processes to exit. Dec 13 16:07:21.878557 systemd-logind[1190]: Removed session 20. Dec 13 16:07:22.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.95.154:22-139.178.68.195:47304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:22.016186 systemd[1]: Started sshd@23-10.244.95.154:22-139.178.68.195:47304.service. Dec 13 16:07:22.931000 audit[4980]: USER_ACCT pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:22.935972 sshd[4980]: Accepted publickey for core from 139.178.68.195 port 47304 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:22.936000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:22.937000 audit[4980]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc446ee290 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:22.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:22.940063 sshd[4980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:22.953722 systemd[1]: Started session-21.scope. Dec 13 16:07:22.954354 systemd-logind[1190]: New session 21 of user core. Dec 13 16:07:22.962000 audit[4980]: USER_START pid=4980 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:22.964000 audit[5001]: CRED_ACQ pid=5001 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:23.659797 sshd[4980]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:23.661000 audit[4980]: USER_END pid=4980 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:23.662000 audit[4980]: CRED_DISP pid=4980 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:23.667926 systemd-logind[1190]: Session 21 logged out. Waiting for processes to exit. Dec 13 16:07:23.668875 systemd[1]: sshd@23-10.244.95.154:22-139.178.68.195:47304.service: Deactivated successfully. Dec 13 16:07:23.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.95.154:22-139.178.68.195:47304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:23.670976 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 16:07:23.672281 systemd-logind[1190]: Removed session 21. Dec 13 16:07:26.910000 audit[5015]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:26.916433 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 16:07:26.916558 kernel: audit: type=1325 audit(1734106046.910:1520): table=filter:127 family=2 entries=20 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:26.910000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcc8acdda0 a2=0 a3=7ffcc8acdd8c items=0 ppid=2146 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:26.923189 kernel: audit: type=1300 audit(1734106046.910:1520): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcc8acdda0 a2=0 a3=7ffcc8acdd8c items=0 ppid=2146 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:26.924431 kernel: audit: type=1327 audit(1734106046.910:1520): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:26.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:26.927000 audit[5015]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:26.939199 kernel: audit: type=1325 audit(1734106046.927:1521): table=nat:128 family=2 entries=106 op=nft_register_chain pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 16:07:26.927000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcc8acdda0 a2=0 a3=7ffcc8acdd8c items=0 ppid=2146 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:26.944053 kernel: audit: type=1300 audit(1734106046.927:1521): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcc8acdda0 a2=0 a3=7ffcc8acdd8c items=0 ppid=2146 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:26.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:26.950582 kernel: audit: type=1327 audit(1734106046.927:1521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 16:07:26.957314 systemd[1]: run-containerd-runc-k8s.io-6819c45694281f9fb942dffe3ceb53cce66f7590eba536208966c288e574cef7-runc.3ZEPg3.mount: Deactivated successfully. Dec 13 16:07:28.811966 systemd[1]: Started sshd@24-10.244.95.154:22-139.178.68.195:39532.service. Dec 13 16:07:28.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.154:22-139.178.68.195:39532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:28.817152 kernel: audit: type=1130 audit(1734106048.811:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.154:22-139.178.68.195:39532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:29.727000 audit[5040]: USER_ACCT pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:29.729252 sshd[5040]: Accepted publickey for core from 139.178.68.195 port 39532 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:29.738260 kernel: audit: type=1101 audit(1734106049.727:1523): pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:29.747456 kernel: audit: type=1103 audit(1734106049.739:1524): pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:29.748061 kernel: audit: type=1006 audit(1734106049.746:1525): pid=5040 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 16:07:29.739000 audit[5040]: CRED_ACQ pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:29.749789 sshd[5040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:29.746000 audit[5040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec53418b0 a2=3 a3=0 items=0 ppid=1 pid=5040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:29.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:29.763490 systemd-logind[1190]: New session 22 of user core. Dec 13 16:07:29.764944 systemd[1]: Started session-22.scope. Dec 13 16:07:29.770000 audit[5040]: USER_START pid=5040 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:29.773000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:30.590128 sshd[5040]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:30.591000 audit[5040]: USER_END pid=5040 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:30.591000 audit[5040]: CRED_DISP pid=5040 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:30.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.154:22-139.178.68.195:39532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:30.594785 systemd[1]: sshd@24-10.244.95.154:22-139.178.68.195:39532.service: Deactivated successfully. Dec 13 16:07:30.597029 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 16:07:30.599668 systemd-logind[1190]: Session 22 logged out. Waiting for processes to exit. Dec 13 16:07:30.602369 systemd-logind[1190]: Removed session 22. Dec 13 16:07:33.920248 systemd[1]: run-containerd-runc-k8s.io-5b85464ad80054ccaa768251e05b78978a453f14b9a6832e78f5746e89960d35-runc.bk4eHF.mount: Deactivated successfully. Dec 13 16:07:35.750105 systemd[1]: Started sshd@25-10.244.95.154:22-139.178.68.195:39544.service. Dec 13 16:07:35.756152 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 16:07:35.757117 kernel: audit: type=1130 audit(1734106055.751:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.154:22-139.178.68.195:39544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:35.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.154:22-139.178.68.195:39544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:36.715694 kernel: audit: type=1101 audit(1734106056.706:1532): pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.716333 kernel: audit: type=1103 audit(1734106056.707:1533): pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.719028 kernel: audit: type=1006 audit(1734106056.707:1534): pid=5086 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 16:07:36.706000 audit[5086]: USER_ACCT pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.707000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.719667 sshd[5086]: Accepted publickey for core from 139.178.68.195 port 39544 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:36.716442 sshd[5086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:36.707000 audit[5086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff147807a0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:36.725276 kernel: audit: type=1300 audit(1734106056.707:1534): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff147807a0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:36.707000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:36.730450 kernel: audit: type=1327 audit(1734106056.707:1534): proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:36.732130 systemd-logind[1190]: New session 23 of user core. Dec 13 16:07:36.732501 systemd[1]: Started session-23.scope. Dec 13 16:07:36.742000 audit[5086]: USER_START pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.748117 kernel: audit: type=1105 audit(1734106056.742:1535): pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.749000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:36.754079 kernel: audit: type=1103 audit(1734106056.749:1536): pid=5088 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:37.651484 sshd[5086]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:37.652000 audit[5086]: USER_END pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:37.672952 kernel: audit: type=1106 audit(1734106057.652:1537): pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:37.674230 kernel: audit: type=1104 audit(1734106057.652:1538): pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:37.652000 audit[5086]: CRED_DISP pid=5086 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:37.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.154:22-139.178.68.195:39544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:37.669677 systemd[1]: sshd@25-10.244.95.154:22-139.178.68.195:39544.service: Deactivated successfully. Dec 13 16:07:37.671228 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 16:07:37.673103 systemd-logind[1190]: Session 23 logged out. Waiting for processes to exit. Dec 13 16:07:37.674143 systemd-logind[1190]: Removed session 23. Dec 13 16:07:42.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.154:22-139.178.68.195:60722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:42.807715 systemd[1]: Started sshd@26-10.244.95.154:22-139.178.68.195:60722.service. Dec 13 16:07:42.816325 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 16:07:42.816716 kernel: audit: type=1130 audit(1734106062.807:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.154:22-139.178.68.195:60722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:43.721000 audit[5098]: USER_ACCT pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.723322 sshd[5098]: Accepted publickey for core from 139.178.68.195 port 60722 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 16:07:43.733117 kernel: audit: type=1101 audit(1734106063.721:1541): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.733000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.735895 sshd[5098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:07:43.741608 kernel: audit: type=1103 audit(1734106063.733:1542): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.741769 kernel: audit: type=1006 audit(1734106063.733:1543): pid=5098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 16:07:43.742542 kernel: audit: type=1300 audit(1734106063.733:1543): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a9255a0 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:43.733000 audit[5098]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a9255a0 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:07:43.756374 kernel: audit: type=1327 audit(1734106063.733:1543): proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:43.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:07:43.757828 systemd[1]: Started session-24.scope. Dec 13 16:07:43.758206 systemd-logind[1190]: New session 24 of user core. Dec 13 16:07:43.762000 audit[5098]: USER_START pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.764000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.771062 kernel: audit: type=1105 audit(1734106063.762:1544): pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:43.771143 kernel: audit: type=1103 audit(1734106063.764:1545): pid=5100 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:44.490941 sshd[5098]: pam_unix(sshd:session): session closed for user core Dec 13 16:07:44.492000 audit[5098]: USER_END pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:44.499000 audit[5098]: CRED_DISP pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:44.507714 kernel: audit: type=1106 audit(1734106064.492:1546): pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:44.508805 kernel: audit: type=1104 audit(1734106064.499:1547): pid=5098 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 16:07:44.508236 systemd-logind[1190]: Session 24 logged out. Waiting for processes to exit. Dec 13 16:07:44.508737 systemd[1]: sshd@26-10.244.95.154:22-139.178.68.195:60722.service: Deactivated successfully. Dec 13 16:07:44.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.154:22-139.178.68.195:60722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:07:44.510293 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 16:07:44.511456 systemd-logind[1190]: Removed session 24.