Dec 13 03:40:26.572082 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 03:40:26.572095 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:40:26.572102 kernel: BIOS-provided physical RAM map: Dec 13 03:40:26.572106 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 03:40:26.572109 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 03:40:26.572113 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 03:40:26.572117 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 03:40:26.572121 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 03:40:26.572125 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b25fff] usable Dec 13 03:40:26.572129 kernel: BIOS-e820: [mem 0x0000000081b26000-0x0000000081b26fff] ACPI NVS Dec 13 03:40:26.572134 kernel: BIOS-e820: [mem 0x0000000081b27000-0x0000000081b27fff] reserved Dec 13 03:40:26.572137 kernel: BIOS-e820: [mem 0x0000000081b28000-0x000000008afccfff] usable Dec 13 03:40:26.572141 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 03:40:26.572145 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 03:40:26.572150 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 03:40:26.572155 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 03:40:26.572159 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 03:40:26.572163 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 03:40:26.572168 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 03:40:26.572172 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 03:40:26.572176 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 03:40:26.572180 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 03:40:26.572184 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 03:40:26.572188 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 03:40:26.572192 kernel: NX (Execute Disable) protection: active Dec 13 03:40:26.572196 kernel: SMBIOS 3.2.1 present. Dec 13 03:40:26.572201 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 03:40:26.572206 kernel: tsc: Detected 3400.000 MHz processor Dec 13 03:40:26.572210 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 03:40:26.572214 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 03:40:26.572219 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 03:40:26.572223 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 03:40:26.572228 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 03:40:26.572232 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 03:40:26.572236 kernel: Using GB pages for direct mapping Dec 13 03:40:26.572241 kernel: ACPI: Early table checksum verification disabled Dec 13 03:40:26.572246 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 03:40:26.572250 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 03:40:26.572254 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 03:40:26.572259 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 03:40:26.572265 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 03:40:26.572270 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 03:40:26.572275 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 03:40:26.572280 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 03:40:26.572285 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 03:40:26.572289 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 03:40:26.572294 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 03:40:26.572299 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 03:40:26.572303 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 03:40:26.572308 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:40:26.572313 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 03:40:26.572318 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 03:40:26.572323 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:40:26.572327 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:40:26.572332 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 03:40:26.572336 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 03:40:26.572343 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:40:26.572348 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 03:40:26.572354 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 03:40:26.572358 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 03:40:26.572363 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 03:40:26.572381 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 03:40:26.572385 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 03:40:26.572390 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 03:40:26.572394 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 03:40:26.572399 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 03:40:26.572403 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 03:40:26.572409 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 03:40:26.572413 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 03:40:26.572418 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 03:40:26.572422 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 03:40:26.572427 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 03:40:26.572431 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 03:40:26.572436 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 03:40:26.572440 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 03:40:26.572446 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 03:40:26.572450 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 03:40:26.572455 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 03:40:26.572459 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 03:40:26.572464 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 03:40:26.572468 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 03:40:26.572473 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 03:40:26.572477 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 03:40:26.572482 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 03:40:26.572487 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 03:40:26.572491 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 03:40:26.572496 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 03:40:26.572500 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 03:40:26.572505 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 03:40:26.572509 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 03:40:26.572514 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 03:40:26.572518 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 03:40:26.572523 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 03:40:26.572528 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 03:40:26.572532 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 03:40:26.572537 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 03:40:26.572541 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 03:40:26.572546 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 03:40:26.572550 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 03:40:26.572555 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 03:40:26.572559 kernel: No NUMA configuration found Dec 13 03:40:26.572564 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 03:40:26.572569 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 03:40:26.572574 kernel: Zone ranges: Dec 13 03:40:26.572578 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 03:40:26.572583 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 03:40:26.572587 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:40:26.572592 kernel: Movable zone start for each node Dec 13 03:40:26.572596 kernel: Early memory node ranges Dec 13 03:40:26.572601 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 03:40:26.572605 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 03:40:26.572610 kernel: node 0: [mem 0x0000000040400000-0x0000000081b25fff] Dec 13 03:40:26.572615 kernel: node 0: [mem 0x0000000081b28000-0x000000008afccfff] Dec 13 03:40:26.572620 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 03:40:26.572624 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 03:40:26.572629 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 03:40:26.572633 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 03:40:26.572638 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 03:40:26.572645 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 03:40:26.572651 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 03:40:26.572656 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 03:40:26.572661 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 03:40:26.572666 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 03:40:26.572671 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 03:40:26.572676 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 03:40:26.572681 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 03:40:26.572686 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 03:40:26.572691 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 03:40:26.572695 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 03:40:26.572701 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 03:40:26.572706 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 03:40:26.572711 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 03:40:26.572715 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 03:40:26.572720 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 03:40:26.572725 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 03:40:26.572730 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 03:40:26.572735 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 03:40:26.572739 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 03:40:26.572745 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 03:40:26.572750 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 03:40:26.572754 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 03:40:26.572759 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 03:40:26.572764 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 03:40:26.572769 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 03:40:26.572774 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 03:40:26.572779 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 03:40:26.572783 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 03:40:26.572789 kernel: TSC deadline timer available Dec 13 03:40:26.572794 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 03:40:26.572799 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 03:40:26.572804 kernel: Booting paravirtualized kernel on bare hardware Dec 13 03:40:26.572809 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 03:40:26.572813 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 03:40:26.572818 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 03:40:26.572823 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 03:40:26.572828 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 03:40:26.572833 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 03:40:26.572838 kernel: Policy zone: Normal Dec 13 03:40:26.572844 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:40:26.572849 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 03:40:26.572854 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 03:40:26.572858 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 03:40:26.572863 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 03:40:26.572868 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 730116K reserved, 0K cma-reserved) Dec 13 03:40:26.572874 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 03:40:26.572879 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 03:40:26.572884 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 03:40:26.572889 kernel: rcu: Hierarchical RCU implementation. Dec 13 03:40:26.572894 kernel: rcu: RCU event tracing is enabled. Dec 13 03:40:26.572899 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 03:40:26.572904 kernel: Rude variant of Tasks RCU enabled. Dec 13 03:40:26.572909 kernel: Tracing variant of Tasks RCU enabled. Dec 13 03:40:26.572914 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 03:40:26.572919 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 03:40:26.572924 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 03:40:26.572929 kernel: random: crng init done Dec 13 03:40:26.572934 kernel: Console: colour dummy device 80x25 Dec 13 03:40:26.572939 kernel: printk: console [tty0] enabled Dec 13 03:40:26.572944 kernel: printk: console [ttyS1] enabled Dec 13 03:40:26.572948 kernel: ACPI: Core revision 20210730 Dec 13 03:40:26.572953 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 03:40:26.572958 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 03:40:26.572964 kernel: DMAR: Host address width 39 Dec 13 03:40:26.572969 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 03:40:26.572973 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 03:40:26.572978 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 03:40:26.572983 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 03:40:26.572988 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 03:40:26.572993 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 03:40:26.572998 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 03:40:26.573003 kernel: x2apic enabled Dec 13 03:40:26.573008 kernel: Switched APIC routing to cluster x2apic. Dec 13 03:40:26.573013 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 03:40:26.573018 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 03:40:26.573023 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 03:40:26.573028 kernel: process: using mwait in idle threads Dec 13 03:40:26.573033 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 03:40:26.573037 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 03:40:26.573042 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 03:40:26.573047 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 03:40:26.573053 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 03:40:26.573057 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 03:40:26.573062 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 03:40:26.573067 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 03:40:26.573072 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 03:40:26.573076 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 03:40:26.573081 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 03:40:26.573086 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 03:40:26.573091 kernel: TAA: Mitigation: TSX disabled Dec 13 03:40:26.573096 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 03:40:26.573100 kernel: SRBDS: Mitigation: Microcode Dec 13 03:40:26.573106 kernel: GDS: Vulnerable: No microcode Dec 13 03:40:26.573111 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 03:40:26.573116 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 03:40:26.573120 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 03:40:26.573125 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 03:40:26.573130 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 03:40:26.573135 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 03:40:26.573139 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 03:40:26.573144 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 03:40:26.573149 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 03:40:26.573154 kernel: Freeing SMP alternatives memory: 32K Dec 13 03:40:26.573159 kernel: pid_max: default: 32768 minimum: 301 Dec 13 03:40:26.573164 kernel: LSM: Security Framework initializing Dec 13 03:40:26.573169 kernel: SELinux: Initializing. Dec 13 03:40:26.573174 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:40:26.573178 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 03:40:26.573183 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 03:40:26.573188 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 03:40:26.573193 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 03:40:26.573198 kernel: ... version: 4 Dec 13 03:40:26.573203 kernel: ... bit width: 48 Dec 13 03:40:26.573207 kernel: ... generic registers: 4 Dec 13 03:40:26.573213 kernel: ... value mask: 0000ffffffffffff Dec 13 03:40:26.573218 kernel: ... max period: 00007fffffffffff Dec 13 03:40:26.573223 kernel: ... fixed-purpose events: 3 Dec 13 03:40:26.573228 kernel: ... event mask: 000000070000000f Dec 13 03:40:26.573232 kernel: signal: max sigframe size: 2032 Dec 13 03:40:26.573237 kernel: rcu: Hierarchical SRCU implementation. Dec 13 03:40:26.573242 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 03:40:26.573247 kernel: smp: Bringing up secondary CPUs ... Dec 13 03:40:26.573252 kernel: x86: Booting SMP configuration: Dec 13 03:40:26.573257 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 03:40:26.573262 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 03:40:26.573267 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 03:40:26.573272 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 03:40:26.573277 kernel: smpboot: Max logical packages: 1 Dec 13 03:40:26.573282 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 03:40:26.573287 kernel: devtmpfs: initialized Dec 13 03:40:26.573292 kernel: x86/mm: Memory block size: 128MB Dec 13 03:40:26.573296 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b26000-0x81b26fff] (4096 bytes) Dec 13 03:40:26.573302 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 03:40:26.573307 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 03:40:26.573312 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 03:40:26.573317 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 03:40:26.573322 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 03:40:26.573326 kernel: audit: initializing netlink subsys (disabled) Dec 13 03:40:26.573331 kernel: audit: type=2000 audit(1734061221.041:1): state=initialized audit_enabled=0 res=1 Dec 13 03:40:26.573336 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 03:40:26.573358 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 03:40:26.573364 kernel: cpuidle: using governor menu Dec 13 03:40:26.573369 kernel: ACPI: bus type PCI registered Dec 13 03:40:26.573374 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 03:40:26.573395 kernel: dca service started, version 1.12.1 Dec 13 03:40:26.573400 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 03:40:26.573405 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 03:40:26.573409 kernel: PCI: Using configuration type 1 for base access Dec 13 03:40:26.573414 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 03:40:26.573419 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 03:40:26.573425 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 03:40:26.573429 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 03:40:26.573434 kernel: ACPI: Added _OSI(Module Device) Dec 13 03:40:26.573439 kernel: ACPI: Added _OSI(Processor Device) Dec 13 03:40:26.573444 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 03:40:26.573449 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 03:40:26.573454 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 03:40:26.573458 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 03:40:26.573463 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 03:40:26.573469 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 03:40:26.573474 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573479 kernel: ACPI: SSDT 0xFFFF9C0C80218700 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 03:40:26.573484 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 03:40:26.573489 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573494 kernel: ACPI: SSDT 0xFFFF9C0C81AE4C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 03:40:26.573498 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573503 kernel: ACPI: SSDT 0xFFFF9C0C81A5E000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 03:40:26.573508 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573514 kernel: ACPI: SSDT 0xFFFF9C0C81B48800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 03:40:26.573518 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573523 kernel: ACPI: SSDT 0xFFFF9C0C8014B000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 03:40:26.573528 kernel: ACPI: Dynamic OEM Table Load: Dec 13 03:40:26.573533 kernel: ACPI: SSDT 0xFFFF9C0C81AE6400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 03:40:26.573538 kernel: ACPI: Interpreter enabled Dec 13 03:40:26.573542 kernel: ACPI: PM: (supports S0 S5) Dec 13 03:40:26.573547 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 03:40:26.573552 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 03:40:26.573558 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 03:40:26.573563 kernel: HEST: Table parsing has been initialized. Dec 13 03:40:26.573567 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 03:40:26.573572 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 03:40:26.573577 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 03:40:26.573582 kernel: ACPI: PM: Power Resource [USBC] Dec 13 03:40:26.573587 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 03:40:26.573592 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 03:40:26.573597 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 03:40:26.573601 kernel: ACPI: PM: Power Resource [WRST] Dec 13 03:40:26.573607 kernel: ACPI: PM: Power Resource [FN00] Dec 13 03:40:26.573612 kernel: ACPI: PM: Power Resource [FN01] Dec 13 03:40:26.573616 kernel: ACPI: PM: Power Resource [FN02] Dec 13 03:40:26.573621 kernel: ACPI: PM: Power Resource [FN03] Dec 13 03:40:26.573626 kernel: ACPI: PM: Power Resource [FN04] Dec 13 03:40:26.573631 kernel: ACPI: PM: Power Resource [PIN] Dec 13 03:40:26.573636 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 03:40:26.573700 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 03:40:26.573748 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 03:40:26.573788 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 03:40:26.573795 kernel: PCI host bridge to bus 0000:00 Dec 13 03:40:26.573837 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 03:40:26.573875 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 03:40:26.573911 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 03:40:26.573947 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 03:40:26.573985 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 03:40:26.574021 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 03:40:26.574071 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 03:40:26.574122 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 03:40:26.574164 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.574210 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 03:40:26.574255 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 03:40:26.574301 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 03:40:26.574361 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 03:40:26.574424 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 03:40:26.574466 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 03:40:26.574509 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 03:40:26.574556 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 03:40:26.574598 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 03:40:26.574638 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 03:40:26.574682 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 03:40:26.574725 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:40:26.574772 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 03:40:26.574814 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:40:26.574859 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 03:40:26.574901 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 03:40:26.574943 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 03:40:26.574988 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 03:40:26.575029 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 03:40:26.575070 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 03:40:26.575116 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 03:40:26.575159 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 03:40:26.575200 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 03:40:26.575245 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 03:40:26.575286 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 03:40:26.575329 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 03:40:26.575397 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 03:40:26.575442 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 03:40:26.575485 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 03:40:26.575526 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 03:40:26.575568 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 03:40:26.575614 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 03:40:26.575658 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.575706 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 03:40:26.575751 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.575798 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 03:40:26.575840 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.575888 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 03:40:26.575931 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.575980 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 03:40:26.576023 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.576071 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 03:40:26.576114 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 03:40:26.576161 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 03:40:26.576210 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 03:40:26.576253 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 03:40:26.576295 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 03:40:26.576342 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 03:40:26.576386 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 03:40:26.576436 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 03:40:26.576481 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 03:40:26.576525 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 03:40:26.576569 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 03:40:26.576614 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:40:26.576657 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:40:26.576707 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 03:40:26.576753 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 03:40:26.576798 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 03:40:26.576842 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 03:40:26.576886 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 03:40:26.576929 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 03:40:26.576973 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:40:26.577015 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:40:26.577060 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:40:26.577102 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:40:26.577150 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 03:40:26.577195 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:40:26.577239 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 03:40:26.577284 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 03:40:26.577327 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 03:40:26.577375 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.577420 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:40:26.577465 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:40:26.577507 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:40:26.577556 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 03:40:26.577619 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 03:40:26.577662 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 03:40:26.577706 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 03:40:26.577751 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 03:40:26.577794 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 03:40:26.577836 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:40:26.577878 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:40:26.577920 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:40:26.577962 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:40:26.578009 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 03:40:26.578056 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 03:40:26.578131 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 03:40:26.578198 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:40:26.578240 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:40:26.578281 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:40:26.578323 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:40:26.578413 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 03:40:26.578464 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 03:40:26.578511 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 03:40:26.578557 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 03:40:26.578602 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 03:40:26.578648 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 03:40:26.578692 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 03:40:26.578739 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 03:40:26.578782 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:40:26.578827 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:40:26.578870 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:40:26.578878 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 03:40:26.578883 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 03:40:26.578888 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 03:40:26.578894 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 03:40:26.578899 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 03:40:26.578904 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 03:40:26.578909 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 03:40:26.578916 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 03:40:26.578921 kernel: iommu: Default domain type: Translated Dec 13 03:40:26.578926 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 03:40:26.578971 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 03:40:26.579017 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 03:40:26.579063 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 03:40:26.579072 kernel: vgaarb: loaded Dec 13 03:40:26.579077 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 03:40:26.579083 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 03:40:26.579089 kernel: PTP clock support registered Dec 13 03:40:26.579094 kernel: PCI: Using ACPI for IRQ routing Dec 13 03:40:26.579099 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 03:40:26.579104 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 03:40:26.579109 kernel: e820: reserve RAM buffer [mem 0x81b26000-0x83ffffff] Dec 13 03:40:26.579114 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 03:40:26.579119 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 03:40:26.579124 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 03:40:26.579130 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 03:40:26.579135 kernel: clocksource: Switched to clocksource tsc-early Dec 13 03:40:26.579141 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 03:40:26.579146 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 03:40:26.579151 kernel: pnp: PnP ACPI init Dec 13 03:40:26.579194 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 03:40:26.579238 kernel: pnp 00:02: [dma 0 disabled] Dec 13 03:40:26.579279 kernel: pnp 00:03: [dma 0 disabled] Dec 13 03:40:26.579324 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 03:40:26.579404 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 03:40:26.579445 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 03:40:26.579486 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 03:40:26.579524 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 03:40:26.579562 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 03:40:26.579601 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 03:40:26.579638 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 03:40:26.579675 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 03:40:26.579712 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 03:40:26.579750 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 03:40:26.579790 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 03:40:26.579828 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 03:40:26.579866 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 03:40:26.579904 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 03:40:26.579941 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 03:40:26.579978 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 03:40:26.580016 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 03:40:26.580057 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 03:40:26.580065 kernel: pnp: PnP ACPI: found 10 devices Dec 13 03:40:26.580071 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 03:40:26.580077 kernel: NET: Registered PF_INET protocol family Dec 13 03:40:26.580082 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:40:26.580087 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 03:40:26.580092 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 03:40:26.580098 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:40:26.580103 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 03:40:26.580108 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 03:40:26.580114 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:40:26.580120 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 03:40:26.580125 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 03:40:26.580131 kernel: NET: Registered PF_XDP protocol family Dec 13 03:40:26.580173 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 03:40:26.580216 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 03:40:26.580258 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 03:40:26.580301 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:40:26.580369 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:40:26.580433 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 03:40:26.580477 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 03:40:26.580520 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 03:40:26.580561 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 03:40:26.580604 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:40:26.580646 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 03:40:26.580691 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 03:40:26.580732 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 03:40:26.580774 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 03:40:26.580815 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 03:40:26.580857 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 03:40:26.580899 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 03:40:26.580941 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 03:40:26.580986 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 03:40:26.581030 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 03:40:26.581073 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:40:26.581115 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 03:40:26.581157 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 03:40:26.581199 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 03:40:26.581237 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 03:40:26.581274 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 03:40:26.581311 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 03:40:26.581375 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 03:40:26.581411 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 03:40:26.581449 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 03:40:26.581492 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 03:40:26.581534 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 03:40:26.581580 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 03:40:26.581621 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 03:40:26.581665 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 03:40:26.581705 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 03:40:26.581748 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 03:40:26.581788 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:40:26.581830 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 03:40:26.581872 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 03:40:26.581880 kernel: PCI: CLS 64 bytes, default 64 Dec 13 03:40:26.581886 kernel: DMAR: No ATSR found Dec 13 03:40:26.581891 kernel: DMAR: No SATC found Dec 13 03:40:26.581897 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 03:40:26.581939 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 03:40:26.581983 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 03:40:26.582026 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 03:40:26.582069 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 03:40:26.582113 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 03:40:26.582156 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 03:40:26.582197 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 03:40:26.582239 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 03:40:26.582281 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 03:40:26.582323 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 03:40:26.582367 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 03:40:26.582409 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 03:40:26.582452 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 03:40:26.582497 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 03:40:26.582539 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 03:40:26.582600 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 03:40:26.582641 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 03:40:26.582683 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 03:40:26.582725 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 03:40:26.582768 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 03:40:26.582808 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 03:40:26.582854 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 03:40:26.582898 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 03:40:26.582942 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 03:40:26.582986 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 03:40:26.583029 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 03:40:26.583075 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 03:40:26.583082 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 03:40:26.583088 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 03:40:26.583094 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 03:40:26.583100 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 03:40:26.583105 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 03:40:26.583110 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 03:40:26.583116 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 03:40:26.583160 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 03:40:26.583168 kernel: Initialise system trusted keyrings Dec 13 03:40:26.583173 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 03:40:26.583180 kernel: Key type asymmetric registered Dec 13 03:40:26.583185 kernel: Asymmetric key parser 'x509' registered Dec 13 03:40:26.583190 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 03:40:26.583195 kernel: io scheduler mq-deadline registered Dec 13 03:40:26.583200 kernel: io scheduler kyber registered Dec 13 03:40:26.583206 kernel: io scheduler bfq registered Dec 13 03:40:26.583248 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 03:40:26.583290 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 03:40:26.583332 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 03:40:26.583419 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 03:40:26.583461 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 03:40:26.583503 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 03:40:26.583551 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 03:40:26.583559 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 03:40:26.583564 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 03:40:26.583570 kernel: pstore: Registered erst as persistent store backend Dec 13 03:40:26.583576 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 03:40:26.583581 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 03:40:26.583586 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 03:40:26.583592 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 03:40:26.583597 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 03:40:26.583639 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 03:40:26.583647 kernel: i8042: PNP: No PS/2 controller found. Dec 13 03:40:26.583684 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 03:40:26.583725 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 03:40:26.583763 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T03:40:25 UTC (1734061225) Dec 13 03:40:26.583802 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 03:40:26.583809 kernel: fail to initialize ptp_kvm Dec 13 03:40:26.583815 kernel: intel_pstate: Intel P-state driver initializing Dec 13 03:40:26.583820 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 03:40:26.583825 kernel: intel_pstate: HWP enabled Dec 13 03:40:26.583830 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 03:40:26.583836 kernel: vesafb: scrolling: redraw Dec 13 03:40:26.583842 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 03:40:26.583847 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000e91ca449, using 768k, total 768k Dec 13 03:40:26.583852 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 03:40:26.583857 kernel: fb0: VESA VGA frame buffer device Dec 13 03:40:26.583863 kernel: NET: Registered PF_INET6 protocol family Dec 13 03:40:26.583868 kernel: Segment Routing with IPv6 Dec 13 03:40:26.583873 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 03:40:26.583878 kernel: NET: Registered PF_PACKET protocol family Dec 13 03:40:26.583883 kernel: Key type dns_resolver registered Dec 13 03:40:26.583889 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 03:40:26.583894 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 03:40:26.583900 kernel: IPI shorthand broadcast: enabled Dec 13 03:40:26.583905 kernel: sched_clock: Marking stable (1681563938, 1339908573)->(4466084466, -1444611955) Dec 13 03:40:26.583910 kernel: registered taskstats version 1 Dec 13 03:40:26.583915 kernel: Loading compiled-in X.509 certificates Dec 13 03:40:26.583920 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 03:40:26.583926 kernel: Key type .fscrypt registered Dec 13 03:40:26.583931 kernel: Key type fscrypt-provisioning registered Dec 13 03:40:26.583937 kernel: pstore: Using crash dump compression: deflate Dec 13 03:40:26.583942 kernel: ima: Allocated hash algorithm: sha1 Dec 13 03:40:26.583947 kernel: ima: No architecture policies found Dec 13 03:40:26.583952 kernel: clk: Disabling unused clocks Dec 13 03:40:26.583958 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 03:40:26.583963 kernel: Write protecting the kernel read-only data: 28672k Dec 13 03:40:26.583968 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 03:40:26.583973 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 03:40:26.583978 kernel: Run /init as init process Dec 13 03:40:26.583984 kernel: with arguments: Dec 13 03:40:26.583990 kernel: /init Dec 13 03:40:26.583995 kernel: with environment: Dec 13 03:40:26.584000 kernel: HOME=/ Dec 13 03:40:26.584005 kernel: TERM=linux Dec 13 03:40:26.584010 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 03:40:26.584016 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:40:26.584023 systemd[1]: Detected architecture x86-64. Dec 13 03:40:26.584029 systemd[1]: Running in initrd. Dec 13 03:40:26.584035 systemd[1]: No hostname configured, using default hostname. Dec 13 03:40:26.584040 systemd[1]: Hostname set to . Dec 13 03:40:26.584045 systemd[1]: Initializing machine ID from random generator. Dec 13 03:40:26.584051 systemd[1]: Queued start job for default target initrd.target. Dec 13 03:40:26.584056 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:40:26.584062 systemd[1]: Reached target cryptsetup.target. Dec 13 03:40:26.584067 systemd[1]: Reached target paths.target. Dec 13 03:40:26.584073 systemd[1]: Reached target slices.target. Dec 13 03:40:26.584078 systemd[1]: Reached target swap.target. Dec 13 03:40:26.584083 systemd[1]: Reached target timers.target. Dec 13 03:40:26.584089 systemd[1]: Listening on iscsid.socket. Dec 13 03:40:26.584094 systemd[1]: Listening on iscsiuio.socket. Dec 13 03:40:26.584100 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:40:26.584105 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:40:26.584111 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:40:26.584117 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Dec 13 03:40:26.584122 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Dec 13 03:40:26.584127 kernel: clocksource: Switched to clocksource tsc Dec 13 03:40:26.584132 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:40:26.584138 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:40:26.584143 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:40:26.584149 systemd[1]: Reached target sockets.target. Dec 13 03:40:26.584154 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:40:26.584160 systemd[1]: Finished network-cleanup.service. Dec 13 03:40:26.584166 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 03:40:26.584171 systemd[1]: Starting systemd-journald.service... Dec 13 03:40:26.584176 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:40:26.584184 systemd-journald[268]: Journal started Dec 13 03:40:26.584210 systemd-journald[268]: Runtime Journal (/run/log/journal/009b16925e964c1ca636aa06b6a958f5) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:40:26.586502 systemd-modules-load[269]: Inserted module 'overlay' Dec 13 03:40:26.644467 kernel: audit: type=1334 audit(1734061226.591:2): prog-id=6 op=LOAD Dec 13 03:40:26.644496 systemd[1]: Starting systemd-resolved.service... Dec 13 03:40:26.644504 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 03:40:26.591000 audit: BPF prog-id=6 op=LOAD Dec 13 03:40:26.678390 kernel: Bridge firewalling registered Dec 13 03:40:26.678406 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 03:40:26.692983 systemd-modules-load[269]: Inserted module 'br_netfilter' Dec 13 03:40:26.728429 systemd[1]: Started systemd-journald.service. Dec 13 03:40:26.728443 kernel: SCSI subsystem initialized Dec 13 03:40:26.695535 systemd-resolved[271]: Positive Trust Anchors: Dec 13 03:40:26.774129 kernel: audit: type=1130 audit(1734061226.731:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.695540 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:40:26.816292 kernel: audit: type=1130 audit(1734061226.772:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.695560 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:40:26.964576 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 03:40:26.964597 kernel: audit: type=1130 audit(1734061226.835:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.964610 kernel: device-mapper: uevent: version 1.0.3 Dec 13 03:40:26.964617 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 03:40:26.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.697072 systemd-resolved[271]: Defaulting to hostname 'linux'. Dec 13 03:40:26.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.733426 systemd[1]: Started systemd-resolved.service. Dec 13 03:40:27.070722 kernel: audit: type=1130 audit(1734061226.973:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.070735 kernel: audit: type=1130 audit(1734061227.026:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.774388 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:40:27.125062 kernel: audit: type=1130 audit(1734061227.079:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:26.836503 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 03:40:26.932201 systemd-modules-load[269]: Inserted module 'dm_multipath' Dec 13 03:40:26.973823 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:40:27.026644 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 03:40:27.079630 systemd[1]: Reached target nss-lookup.target. Dec 13 03:40:27.134013 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 03:40:27.154922 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:40:27.155218 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:40:27.158189 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:40:27.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.158959 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:40:27.207552 kernel: audit: type=1130 audit(1734061227.156:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.219701 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 03:40:27.283383 kernel: audit: type=1130 audit(1734061227.219:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.276010 systemd[1]: Starting dracut-cmdline.service... Dec 13 03:40:27.297433 dracut-cmdline[294]: dracut-dracut-053 Dec 13 03:40:27.297433 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 03:40:27.297433 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:40:27.366419 kernel: Loading iSCSI transport class v2.0-870. Dec 13 03:40:27.366432 kernel: iscsi: registered transport (tcp) Dec 13 03:40:27.424902 kernel: iscsi: registered transport (qla4xxx) Dec 13 03:40:27.424918 kernel: QLogic iSCSI HBA Driver Dec 13 03:40:27.441189 systemd[1]: Finished dracut-cmdline.service. Dec 13 03:40:27.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.450050 systemd[1]: Starting dracut-pre-udev.service... Dec 13 03:40:27.505392 kernel: raid6: avx2x4 gen() 48341 MB/s Dec 13 03:40:27.540344 kernel: raid6: avx2x4 xor() 20991 MB/s Dec 13 03:40:27.575372 kernel: raid6: avx2x2 gen() 53179 MB/s Dec 13 03:40:27.610372 kernel: raid6: avx2x2 xor() 32052 MB/s Dec 13 03:40:27.644345 kernel: raid6: avx2x1 gen() 45191 MB/s Dec 13 03:40:27.678372 kernel: raid6: avx2x1 xor() 27930 MB/s Dec 13 03:40:27.712372 kernel: raid6: sse2x4 gen() 21350 MB/s Dec 13 03:40:27.746413 kernel: raid6: sse2x4 xor() 11972 MB/s Dec 13 03:40:27.780410 kernel: raid6: sse2x2 gen() 21628 MB/s Dec 13 03:40:27.814377 kernel: raid6: sse2x2 xor() 13409 MB/s Dec 13 03:40:27.848412 kernel: raid6: sse2x1 gen() 18292 MB/s Dec 13 03:40:27.899777 kernel: raid6: sse2x1 xor() 8928 MB/s Dec 13 03:40:27.899793 kernel: raid6: using algorithm avx2x2 gen() 53179 MB/s Dec 13 03:40:27.899800 kernel: raid6: .... xor() 32052 MB/s, rmw enabled Dec 13 03:40:27.917745 kernel: raid6: using avx2x2 recovery algorithm Dec 13 03:40:27.963390 kernel: xor: automatically using best checksumming function avx Dec 13 03:40:28.042375 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 03:40:28.047202 systemd[1]: Finished dracut-pre-udev.service. Dec 13 03:40:28.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:28.056000 audit: BPF prog-id=7 op=LOAD Dec 13 03:40:28.056000 audit: BPF prog-id=8 op=LOAD Dec 13 03:40:28.057332 systemd[1]: Starting systemd-udevd.service... Dec 13 03:40:28.065831 systemd-udevd[474]: Using default interface naming scheme 'v252'. Dec 13 03:40:28.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:28.071585 systemd[1]: Started systemd-udevd.service. Dec 13 03:40:28.111472 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Dec 13 03:40:28.085956 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 03:40:28.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:28.112250 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 03:40:28.129486 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:40:28.180906 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:40:28.209451 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 03:40:28.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:28.211351 kernel: libata version 3.00 loaded. Dec 13 03:40:28.247155 kernel: ACPI: bus type USB registered Dec 13 03:40:28.247212 kernel: usbcore: registered new interface driver usbfs Dec 13 03:40:28.247225 kernel: usbcore: registered new interface driver hub Dec 13 03:40:28.282195 kernel: usbcore: registered new device driver usb Dec 13 03:40:28.316014 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 03:40:28.316036 kernel: AES CTR mode by8 optimization enabled Dec 13 03:40:28.317346 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 03:40:28.417285 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 03:40:28.891232 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 03:40:28.891306 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:40:28.891368 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 03:40:28.891419 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 03:40:28.891427 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:40:28.891478 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 03:40:28.891486 kernel: scsi host0: ahci Dec 13 03:40:28.891545 kernel: scsi host1: ahci Dec 13 03:40:28.891602 kernel: scsi host2: ahci Dec 13 03:40:28.891656 kernel: scsi host3: ahci Dec 13 03:40:28.891707 kernel: scsi host4: ahci Dec 13 03:40:28.891757 kernel: scsi host5: ahci Dec 13 03:40:28.891808 kernel: scsi host6: ahci Dec 13 03:40:28.891860 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Dec 13 03:40:28.891868 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Dec 13 03:40:28.891875 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Dec 13 03:40:28.891881 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Dec 13 03:40:28.891887 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Dec 13 03:40:28.891894 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Dec 13 03:40:28.891900 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Dec 13 03:40:28.891906 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 03:40:28.891956 kernel: pps pps0: new PPS source ptp0 Dec 13 03:40:28.892015 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 03:40:28.892065 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 03:40:28.892121 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 03:40:28.892169 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:40:28.892219 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 03:40:28.892266 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e6:30 Dec 13 03:40:28.892316 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 03:40:28.892370 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 03:40:28.892421 kernel: hub 1-0:1.0: USB hub found Dec 13 03:40:28.892482 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:40:28.892533 kernel: hub 1-0:1.0: 16 ports detected Dec 13 03:40:28.892585 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:40:28.892636 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:40:28.892686 kernel: hub 2-0:1.0: USB hub found Dec 13 03:40:28.892745 kernel: pps pps1: new PPS source ptp2 Dec 13 03:40:28.892796 kernel: hub 2-0:1.0: 10 ports detected Dec 13 03:40:28.892849 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 03:40:28.892901 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:40:28.892909 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 03:40:28.892959 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 03:40:28.892966 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e6:31 Dec 13 03:40:28.893019 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 03:40:28.893027 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 03:40:28.893077 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 03:40:28.893084 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 03:40:28.893133 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 03:40:28.893140 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:40:28.893191 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 03:40:28.893198 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 03:40:29.716694 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:40:29.716705 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 03:40:29.716818 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 03:40:29.716876 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 03:40:29.716884 kernel: hub 1-14:1.0: USB hub found Dec 13 03:40:29.716944 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 03:40:29.716952 kernel: hub 1-14:1.0: 4 ports detected Dec 13 03:40:29.717009 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:40:29.717017 kernel: ata2.00: Features: NCQ-prio Dec 13 03:40:29.717023 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 03:40:29.717030 kernel: ata1.00: Features: NCQ-prio Dec 13 03:40:29.717037 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 03:40:29.717089 kernel: ata2.00: configured for UDMA/133 Dec 13 03:40:29.717096 kernel: port_module: 9 callbacks suppressed Dec 13 03:40:29.717103 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 03:40:29.717152 kernel: ata1.00: configured for UDMA/133 Dec 13 03:40:29.717161 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 03:40:29.717212 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:40:29.834459 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 03:40:29.834535 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 03:40:29.834641 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 03:40:29.834705 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:29.834715 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:40:29.834722 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 03:40:29.834778 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:40:29.834840 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 03:40:29.834899 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 03:40:29.834991 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 03:40:29.835088 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 03:40:29.835153 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:40:29.835213 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:40:29.835221 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 03:40:29.835227 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 03:40:29.835289 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 03:40:29.835349 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 03:40:29.835408 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 03:40:29.835416 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 03:40:29.835470 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 03:40:29.835526 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 03:40:29.835580 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:29.835588 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 03:40:29.835594 kernel: GPT:9289727 != 937703087 Dec 13 03:40:29.835601 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 03:40:29.835607 kernel: GPT:9289727 != 937703087 Dec 13 03:40:29.835613 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 03:40:29.835619 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:40:29.835627 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:29.835633 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 03:40:29.852347 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 03:40:29.860615 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 03:40:29.952295 kernel: usbcore: registered new interface driver usbhid Dec 13 03:40:29.952309 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (534) Dec 13 03:40:29.952316 kernel: usbhid: USB HID core driver Dec 13 03:40:29.952323 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 03:40:29.952406 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 03:40:29.942755 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 03:40:29.970543 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 03:40:29.983241 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 03:40:30.123327 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 03:40:30.123462 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 03:40:30.123471 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 03:40:30.123553 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:30.026283 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:40:30.156443 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:40:30.156454 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:30.072598 systemd[1]: Starting disk-uuid.service... Dec 13 03:40:30.174438 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:40:30.174449 disk-uuid[689]: Primary Header is updated. Dec 13 03:40:30.174449 disk-uuid[689]: Secondary Entries is updated. Dec 13 03:40:30.174449 disk-uuid[689]: Secondary Header is updated. Dec 13 03:40:30.225368 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:30.225380 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:40:31.197325 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 03:40:31.216263 disk-uuid[690]: The operation has completed successfully. Dec 13 03:40:31.225462 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 03:40:31.250842 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 03:40:31.347487 kernel: audit: type=1130 audit(1734061231.258:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.347527 kernel: audit: type=1131 audit(1734061231.258:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.250900 systemd[1]: Finished disk-uuid.service. Dec 13 03:40:31.376425 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 03:40:31.261838 systemd[1]: Starting verity-setup.service... Dec 13 03:40:31.418305 systemd[1]: Found device dev-mapper-usr.device. Dec 13 03:40:31.429513 systemd[1]: Mounting sysusr-usr.mount... Dec 13 03:40:31.440962 systemd[1]: Finished verity-setup.service. Dec 13 03:40:31.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.504345 kernel: audit: type=1130 audit(1734061231.455:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.560197 systemd[1]: Mounted sysusr-usr.mount. Dec 13 03:40:31.576528 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 03:40:31.568618 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 03:40:31.658497 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:40:31.658512 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:40:31.658519 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:40:31.658530 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:40:31.569027 systemd[1]: Starting ignition-setup.service... Dec 13 03:40:31.591812 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 03:40:31.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.666868 systemd[1]: Finished ignition-setup.service. Dec 13 03:40:31.790883 kernel: audit: type=1130 audit(1734061231.682:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.790898 kernel: audit: type=1130 audit(1734061231.741:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.682770 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 03:40:31.823261 kernel: audit: type=1334 audit(1734061231.799:24): prog-id=9 op=LOAD Dec 13 03:40:31.799000 audit: BPF prog-id=9 op=LOAD Dec 13 03:40:31.742020 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 03:40:31.801307 systemd[1]: Starting systemd-networkd.service... Dec 13 03:40:31.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.837105 systemd-networkd[879]: lo: Link UP Dec 13 03:40:31.905577 kernel: audit: type=1130 audit(1734061231.837:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.867066 ignition[869]: Ignition 2.14.0 Dec 13 03:40:31.837107 systemd-networkd[879]: lo: Gained carrier Dec 13 03:40:31.867071 ignition[869]: Stage: fetch-offline Dec 13 03:40:31.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.837403 systemd-networkd[879]: Enumeration completed Dec 13 03:40:32.064175 kernel: audit: type=1130 audit(1734061231.930:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:32.064192 kernel: audit: type=1130 audit(1734061231.990:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:32.064203 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:40:31.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.867097 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:31.837474 systemd[1]: Started systemd-networkd.service. Dec 13 03:40:32.110452 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 03:40:31.867111 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:31.838156 systemd-networkd[879]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:40:32.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.869976 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:32.146453 iscsid[897]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:40:32.146453 iscsid[897]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 03:40:32.146453 iscsid[897]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 03:40:32.146453 iscsid[897]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 03:40:32.146453 iscsid[897]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 03:40:32.146453 iscsid[897]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:40:32.146453 iscsid[897]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 03:40:32.313543 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:40:32.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.838516 systemd[1]: Reached target network.target. Dec 13 03:40:32.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:31.870041 ignition[869]: parsed url from cmdline: "" Dec 13 03:40:31.879702 unknown[869]: fetched base config from "system" Dec 13 03:40:31.870043 ignition[869]: no config URL provided Dec 13 03:40:31.879706 unknown[869]: fetched user config from "system" Dec 13 03:40:31.870046 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:40:31.899022 systemd[1]: Starting iscsiuio.service... Dec 13 03:40:31.870066 ignition[869]: parsing config with SHA512: b0c6c989d3db0bcfd4ea22573fce1d52ea6ca2235d28f5dcb26fbee7bed1ccdde24051e3afc65ee21519c107ff9b3350c122157362c9b6254edbd9bdb286c3dc Dec 13 03:40:31.912646 systemd[1]: Started iscsiuio.service. Dec 13 03:40:31.879973 ignition[869]: fetch-offline: fetch-offline passed Dec 13 03:40:31.931621 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 03:40:31.879976 ignition[869]: POST message to Packet Timeline Dec 13 03:40:31.990675 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 03:40:31.879980 ignition[869]: POST Status error: resource requires networking Dec 13 03:40:31.991180 systemd[1]: Starting ignition-kargs.service... Dec 13 03:40:31.880017 ignition[869]: Ignition finished successfully Dec 13 03:40:32.064921 systemd-networkd[879]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:40:32.068446 ignition[887]: Ignition 2.14.0 Dec 13 03:40:32.078239 systemd[1]: Starting iscsid.service... Dec 13 03:40:32.068449 ignition[887]: Stage: kargs Dec 13 03:40:32.102639 systemd[1]: Started iscsid.service. Dec 13 03:40:32.068504 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:32.117808 systemd[1]: Starting dracut-initqueue.service... Dec 13 03:40:32.068514 ignition[887]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:32.137487 systemd[1]: Finished dracut-initqueue.service. Dec 13 03:40:32.069768 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:32.154754 systemd[1]: Reached target remote-fs-pre.target. Dec 13 03:40:32.071511 ignition[887]: kargs: kargs passed Dec 13 03:40:32.174609 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:40:32.071516 ignition[887]: POST message to Packet Timeline Dec 13 03:40:32.209710 systemd[1]: Reached target remote-fs.target. Dec 13 03:40:32.071526 ignition[887]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:40:32.240176 systemd[1]: Starting dracut-pre-mount.service... Dec 13 03:40:32.073458 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46232->[::1]:53: read: connection refused Dec 13 03:40:32.273756 systemd[1]: Finished dracut-pre-mount.service. Dec 13 03:40:32.273773 ignition[887]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 03:40:32.311112 systemd-networkd[879]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:40:32.274284 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33159->[::1]:53: read: connection refused Dec 13 03:40:32.339369 systemd-networkd[879]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:40:32.367995 systemd-networkd[879]: enp1s0f1np1: Link UP Dec 13 03:40:32.368250 systemd-networkd[879]: enp1s0f1np1: Gained carrier Dec 13 03:40:32.376657 systemd-networkd[879]: enp1s0f0np0: Link UP Dec 13 03:40:32.376829 systemd-networkd[879]: eno2: Link UP Dec 13 03:40:32.376988 systemd-networkd[879]: eno1: Link UP Dec 13 03:40:32.675096 ignition[887]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 03:40:32.676221 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:35356->[::1]:53: read: connection refused Dec 13 03:40:33.121157 systemd-networkd[879]: enp1s0f0np0: Gained carrier Dec 13 03:40:33.129589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 03:40:33.155657 systemd-networkd[879]: enp1s0f0np0: DHCPv4 address 147.75.202.177/31, gateway 147.75.202.176 acquired from 145.40.83.140 Dec 13 03:40:33.476808 ignition[887]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 03:40:33.478026 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60590->[::1]:53: read: connection refused Dec 13 03:40:33.865915 systemd-networkd[879]: enp1s0f1np1: Gained IPv6LL Dec 13 03:40:34.761950 systemd-networkd[879]: enp1s0f0np0: Gained IPv6LL Dec 13 03:40:35.079625 ignition[887]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 03:40:35.080854 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44457->[::1]:53: read: connection refused Dec 13 03:40:38.284387 ignition[887]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 03:40:39.108655 ignition[887]: GET result: OK Dec 13 03:40:39.401587 ignition[887]: Ignition finished successfully Dec 13 03:40:39.406375 systemd[1]: Finished ignition-kargs.service. Dec 13 03:40:39.493493 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 03:40:39.493510 kernel: audit: type=1130 audit(1734061239.416:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:39.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:39.426318 ignition[914]: Ignition 2.14.0 Dec 13 03:40:39.419753 systemd[1]: Starting ignition-disks.service... Dec 13 03:40:39.426322 ignition[914]: Stage: disks Dec 13 03:40:39.426463 ignition[914]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:39.426473 ignition[914]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:39.429050 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:39.429641 ignition[914]: disks: disks passed Dec 13 03:40:39.429645 ignition[914]: POST message to Packet Timeline Dec 13 03:40:39.429654 ignition[914]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:40:40.203886 ignition[914]: GET result: OK Dec 13 03:40:40.528453 ignition[914]: Ignition finished successfully Dec 13 03:40:40.531511 systemd[1]: Finished ignition-disks.service. Dec 13 03:40:40.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:40.544879 systemd[1]: Reached target initrd-root-device.target. Dec 13 03:40:40.621605 kernel: audit: type=1130 audit(1734061240.543:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:40.607575 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:40:40.607611 systemd[1]: Reached target local-fs.target. Dec 13 03:40:40.630581 systemd[1]: Reached target sysinit.target. Dec 13 03:40:40.644556 systemd[1]: Reached target basic.target. Dec 13 03:40:40.658172 systemd[1]: Starting systemd-fsck-root.service... Dec 13 03:40:40.677899 systemd-fsck[929]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 03:40:40.691900 systemd[1]: Finished systemd-fsck-root.service. Dec 13 03:40:40.782989 kernel: audit: type=1130 audit(1734061240.700:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:40.783004 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 03:40:40.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:40.706864 systemd[1]: Mounting sysroot.mount... Dec 13 03:40:40.789991 systemd[1]: Mounted sysroot.mount. Dec 13 03:40:40.803623 systemd[1]: Reached target initrd-root-fs.target. Dec 13 03:40:40.811361 systemd[1]: Mounting sysroot-usr.mount... Dec 13 03:40:40.825164 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 03:40:40.843908 systemd[1]: Starting flatcar-static-network.service... Dec 13 03:40:40.859581 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 03:40:40.859669 systemd[1]: Reached target ignition-diskful.target. Dec 13 03:40:40.878241 systemd[1]: Mounted sysroot-usr.mount. Dec 13 03:40:40.901281 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:40:40.914052 systemd[1]: Starting initrd-setup-root.service... Dec 13 03:40:41.045897 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (943) Dec 13 03:40:41.045914 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:40:41.045922 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:40:41.045930 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:40:41.045937 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:40:40.981797 systemd[1]: Finished initrd-setup-root.service. Dec 13 03:40:41.107468 kernel: audit: type=1130 audit(1734061241.054:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.107582 coreos-metadata[938]: Dec 13 03:40:40.983 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:40:41.129589 coreos-metadata[936]: Dec 13 03:40:40.985 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:40:41.149578 initrd-setup-root[948]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 03:40:41.055654 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:40:41.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.198524 initrd-setup-root[956]: cut: /sysroot/etc/group: No such file or directory Dec 13 03:40:41.230574 kernel: audit: type=1130 audit(1734061241.164:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.115925 systemd[1]: Starting ignition-mount.service... Dec 13 03:40:41.237593 initrd-setup-root[964]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 03:40:41.136924 systemd[1]: Starting sysroot-boot.service... Dec 13 03:40:41.254581 initrd-setup-root[972]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 03:40:41.156748 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 03:40:41.274555 ignition[1012]: INFO : Ignition 2.14.0 Dec 13 03:40:41.274555 ignition[1012]: INFO : Stage: mount Dec 13 03:40:41.274555 ignition[1012]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:41.274555 ignition[1012]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:41.274555 ignition[1012]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:41.274555 ignition[1012]: INFO : mount: mount passed Dec 13 03:40:41.274555 ignition[1012]: INFO : POST message to Packet Timeline Dec 13 03:40:41.274555 ignition[1012]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:40:41.156792 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 03:40:41.159431 systemd[1]: Finished sysroot-boot.service. Dec 13 03:40:41.630235 coreos-metadata[936]: Dec 13 03:40:41.630 INFO Fetch successful Dec 13 03:40:41.705177 coreos-metadata[936]: Dec 13 03:40:41.705 INFO wrote hostname ci-3510.3.6-a-cc0c4ef4b9 to /sysroot/etc/hostname Dec 13 03:40:41.705643 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 03:40:41.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.784540 kernel: audit: type=1130 audit(1734061241.726:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.821159 ignition[1012]: INFO : GET result: OK Dec 13 03:40:41.860628 coreos-metadata[938]: Dec 13 03:40:41.860 INFO Fetch successful Dec 13 03:40:41.901212 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 03:40:41.901261 systemd[1]: Finished flatcar-static-network.service. Dec 13 03:40:41.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:42.031872 kernel: audit: type=1130 audit(1734061241.918:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:42.031891 kernel: audit: type=1131 audit(1734061241.918:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:42.278402 ignition[1012]: INFO : Ignition finished successfully Dec 13 03:40:42.279206 systemd[1]: Finished ignition-mount.service. Dec 13 03:40:42.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:42.295251 systemd[1]: Starting ignition-files.service... Dec 13 03:40:42.367429 kernel: audit: type=1130 audit(1734061242.293:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:42.362170 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:40:42.425028 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1028) Dec 13 03:40:42.425044 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:40:42.425051 kernel: BTRFS info (device sda6): using free space tree Dec 13 03:40:42.448195 kernel: BTRFS info (device sda6): has skinny extents Dec 13 03:40:42.497344 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 03:40:42.498549 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:40:42.514450 ignition[1047]: INFO : Ignition 2.14.0 Dec 13 03:40:42.514450 ignition[1047]: INFO : Stage: files Dec 13 03:40:42.514450 ignition[1047]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:42.514450 ignition[1047]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:42.514450 ignition[1047]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:42.514450 ignition[1047]: DEBUG : files: compiled without relabeling support, skipping Dec 13 03:40:42.518141 unknown[1047]: wrote ssh authorized keys file for user: core Dec 13 03:40:42.591542 ignition[1047]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 03:40:42.591542 ignition[1047]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 03:40:42.591542 ignition[1047]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 03:40:42.591542 ignition[1047]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 03:40:42.591542 ignition[1047]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 03:40:42.591542 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 03:40:42.591542 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 03:40:42.591542 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 03:40:42.721522 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1049) Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:40:42.721608 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem19744711" Dec 13 03:40:42.975678 ignition[1047]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem19744711": device or resource busy Dec 13 03:40:42.975678 ignition[1047]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem19744711", trying btrfs: device or resource busy Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem19744711" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem19744711" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem19744711" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem19744711" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:40:42.975678 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 03:40:43.181542 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 03:40:43.356184 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:40:43.356184 ignition[1047]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:40:43.356184 ignition[1047]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:40:43.356184 ignition[1047]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Dec 13 03:40:43.356184 ignition[1047]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Dec 13 03:40:43.356184 ignition[1047]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(13): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(13): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(14): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(14): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:40:43.437596 ignition[1047]: INFO : files: files passed Dec 13 03:40:43.437596 ignition[1047]: INFO : POST message to Packet Timeline Dec 13 03:40:43.437596 ignition[1047]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:40:44.073543 ignition[1047]: INFO : GET result: OK Dec 13 03:40:44.472462 ignition[1047]: INFO : Ignition finished successfully Dec 13 03:40:44.475622 systemd[1]: Finished ignition-files.service. Dec 13 03:40:44.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.495059 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 03:40:44.567577 kernel: audit: type=1130 audit(1734061244.488:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.556580 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 03:40:44.592688 initrd-setup-root-after-ignition[1082]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 03:40:44.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.556902 systemd[1]: Starting ignition-quench.service... Dec 13 03:40:44.781481 kernel: audit: type=1130 audit(1734061244.601:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.781497 kernel: audit: type=1130 audit(1734061244.668:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.781505 kernel: audit: type=1131 audit(1734061244.668:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.574694 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 03:40:44.602770 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 03:40:44.602847 systemd[1]: Finished ignition-quench.service. Dec 13 03:40:44.936108 kernel: audit: type=1130 audit(1734061244.822:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.936121 kernel: audit: type=1131 audit(1734061244.822:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.668610 systemd[1]: Reached target ignition-complete.target. Dec 13 03:40:44.789935 systemd[1]: Starting initrd-parse-etc.service... Dec 13 03:40:44.803472 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 03:40:44.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.803513 systemd[1]: Finished initrd-parse-etc.service. Dec 13 03:40:45.056561 kernel: audit: type=1130 audit(1734061244.985:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.822635 systemd[1]: Reached target initrd-fs.target. Dec 13 03:40:44.944555 systemd[1]: Reached target initrd.target. Dec 13 03:40:44.944614 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 03:40:44.944960 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 03:40:45.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.966684 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 03:40:45.192567 kernel: audit: type=1131 audit(1734061245.116:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:44.985917 systemd[1]: Starting initrd-cleanup.service... Dec 13 03:40:45.052271 systemd[1]: Stopped target nss-lookup.target. Dec 13 03:40:45.065604 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 03:40:45.081582 systemd[1]: Stopped target timers.target. Dec 13 03:40:45.096632 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 03:40:45.096738 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 03:40:45.116920 systemd[1]: Stopped target initrd.target. Dec 13 03:40:45.184660 systemd[1]: Stopped target basic.target. Dec 13 03:40:45.199669 systemd[1]: Stopped target ignition-complete.target. Dec 13 03:40:45.216643 systemd[1]: Stopped target ignition-diskful.target. Dec 13 03:40:45.233727 systemd[1]: Stopped target initrd-root-device.target. Dec 13 03:40:45.436476 kernel: audit: type=1131 audit(1734061245.364:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.251776 systemd[1]: Stopped target remote-fs.target. Dec 13 03:40:45.268932 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 03:40:45.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.286962 systemd[1]: Stopped target sysinit.target. Dec 13 03:40:45.536654 kernel: audit: type=1131 audit(1734061245.460:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.301945 systemd[1]: Stopped target local-fs.target. Dec 13 03:40:45.317061 systemd[1]: Stopped target local-fs-pre.target. Dec 13 03:40:45.332936 systemd[1]: Stopped target swap.target. Dec 13 03:40:45.348834 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 03:40:45.349205 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 03:40:45.366160 systemd[1]: Stopped target cryptsetup.target. Dec 13 03:40:45.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.444629 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 03:40:45.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.444719 systemd[1]: Stopped dracut-initqueue.service. Dec 13 03:40:45.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.460694 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 03:40:45.680569 ignition[1097]: INFO : Ignition 2.14.0 Dec 13 03:40:45.680569 ignition[1097]: INFO : Stage: umount Dec 13 03:40:45.680569 ignition[1097]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:40:45.680569 ignition[1097]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 03:40:45.680569 ignition[1097]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 03:40:45.680569 ignition[1097]: INFO : umount: umount passed Dec 13 03:40:45.680569 ignition[1097]: INFO : POST message to Packet Timeline Dec 13 03:40:45.680569 ignition[1097]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 03:40:45.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.460771 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 03:40:45.529713 systemd[1]: Stopped target paths.target. Dec 13 03:40:45.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.543896 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 03:40:45.546719 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 03:40:45.559943 systemd[1]: Stopped target slices.target. Dec 13 03:40:45.574044 systemd[1]: Stopped target sockets.target. Dec 13 03:40:45.588902 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 03:40:45.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.589156 systemd[1]: Closed iscsid.socket. Dec 13 03:40:45.604021 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 03:40:45.604420 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 03:40:45.622044 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 03:40:45.622424 systemd[1]: Stopped ignition-files.service. Dec 13 03:40:45.639044 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 03:40:45.639444 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 03:40:45.659159 systemd[1]: Stopping ignition-mount.service... Dec 13 03:40:45.670522 systemd[1]: Stopping iscsiuio.service... Dec 13 03:40:45.687524 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 03:40:45.687622 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 03:40:45.708608 systemd[1]: Stopping sysroot-boot.service... Dec 13 03:40:45.726521 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 03:40:45.726776 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 03:40:45.754023 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 03:40:45.754408 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 03:40:45.780838 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 03:40:45.782603 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 03:40:45.782845 systemd[1]: Stopped iscsiuio.service. Dec 13 03:40:45.796745 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 03:40:45.797001 systemd[1]: Closed iscsiuio.socket. Dec 13 03:40:45.813264 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 03:40:45.813508 systemd[1]: Finished initrd-cleanup.service. Dec 13 03:40:45.863590 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 03:40:45.863820 systemd[1]: Stopped sysroot-boot.service. Dec 13 03:40:46.461408 ignition[1097]: INFO : GET result: OK Dec 13 03:40:46.770246 ignition[1097]: INFO : Ignition finished successfully Dec 13 03:40:46.772615 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 03:40:46.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.772857 systemd[1]: Stopped ignition-mount.service. Dec 13 03:40:46.788905 systemd[1]: Stopped target network.target. Dec 13 03:40:46.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.804572 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 03:40:46.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.804716 systemd[1]: Stopped ignition-disks.service. Dec 13 03:40:46.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.819663 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 03:40:46.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.819789 systemd[1]: Stopped ignition-kargs.service. Dec 13 03:40:46.835639 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 03:40:46.835753 systemd[1]: Stopped ignition-setup.service. Dec 13 03:40:46.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.852856 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 03:40:46.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.930000 audit: BPF prog-id=6 op=UNLOAD Dec 13 03:40:46.853002 systemd[1]: Stopped initrd-setup-root.service. Dec 13 03:40:46.868950 systemd[1]: Stopping systemd-networkd.service... Dec 13 03:40:46.874481 systemd-networkd[879]: enp1s0f0np0: DHCPv6 lease lost Dec 13 03:40:46.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.883782 systemd[1]: Stopping systemd-resolved.service... Dec 13 03:40:46.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.886533 systemd-networkd[879]: enp1s0f1np1: DHCPv6 lease lost Dec 13 03:40:47.004000 audit: BPF prog-id=9 op=UNLOAD Dec 13 03:40:47.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.898240 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 03:40:46.898509 systemd[1]: Stopped systemd-resolved.service. Dec 13 03:40:46.915034 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 03:40:47.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.915328 systemd[1]: Stopped systemd-networkd.service. Dec 13 03:40:46.930086 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 03:40:46.930171 systemd[1]: Closed systemd-networkd.socket. Dec 13 03:40:47.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.950995 systemd[1]: Stopping network-cleanup.service... Dec 13 03:40:47.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.964549 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 03:40:47.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.964684 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 03:40:46.981689 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 03:40:47.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.981810 systemd[1]: Stopped systemd-sysctl.service. Dec 13 03:40:47.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:47.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:46.998087 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 03:40:46.998233 systemd[1]: Stopped systemd-modules-load.service. Dec 13 03:40:47.013970 systemd[1]: Stopping systemd-udevd.service... Dec 13 03:40:47.033337 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 03:40:47.034664 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 03:40:47.034725 systemd[1]: Stopped systemd-udevd.service. Dec 13 03:40:47.051797 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 03:40:47.051833 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 03:40:47.066529 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 03:40:47.066557 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 03:40:47.082548 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 03:40:47.082621 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 03:40:47.098825 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 03:40:47.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:47.098964 systemd[1]: Stopped dracut-cmdline.service. Dec 13 03:40:47.113660 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 03:40:47.113778 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 03:40:47.130363 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 03:40:47.147372 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 03:40:47.147400 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 03:40:47.163581 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 03:40:47.163621 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 03:40:47.404496 iscsid[897]: iscsid shutting down. Dec 13 03:40:47.283301 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 03:40:47.283582 systemd[1]: Stopped network-cleanup.service. Dec 13 03:40:47.296909 systemd[1]: Reached target initrd-switch-root.target. Dec 13 03:40:47.314051 systemd[1]: Starting initrd-switch-root.service... Dec 13 03:40:47.348419 systemd[1]: Switching root. Dec 13 03:40:47.404775 systemd-journald[268]: Journal stopped Dec 13 03:40:51.448684 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Dec 13 03:40:51.448699 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 03:40:51.448707 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 03:40:51.448713 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 03:40:51.448719 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 03:40:51.448724 kernel: SELinux: policy capability open_perms=1 Dec 13 03:40:51.448730 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 03:40:51.448736 kernel: SELinux: policy capability always_check_network=0 Dec 13 03:40:51.448741 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 03:40:51.448748 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 03:40:51.448753 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 03:40:51.448759 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 03:40:51.448765 systemd[1]: Successfully loaded SELinux policy in 317.588ms. Dec 13 03:40:51.448771 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.052ms. Dec 13 03:40:51.448780 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:40:51.448786 systemd[1]: Detected architecture x86-64. Dec 13 03:40:51.448792 systemd[1]: Detected first boot. Dec 13 03:40:51.448798 systemd[1]: Hostname set to . Dec 13 03:40:51.448804 systemd[1]: Initializing machine ID from random generator. Dec 13 03:40:51.448810 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 03:40:51.448816 systemd[1]: Populated /etc with preset unit settings. Dec 13 03:40:51.448823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:40:51.448830 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:40:51.448837 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:40:51.448843 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 03:40:51.448849 kernel: audit: type=1334 audit(1734061249.739:91): prog-id=12 op=LOAD Dec 13 03:40:51.448855 kernel: audit: type=1334 audit(1734061249.739:92): prog-id=3 op=UNLOAD Dec 13 03:40:51.448861 kernel: audit: type=1334 audit(1734061249.784:93): prog-id=13 op=LOAD Dec 13 03:40:51.448867 kernel: audit: type=1334 audit(1734061249.829:94): prog-id=14 op=LOAD Dec 13 03:40:51.448873 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 03:40:51.448879 kernel: audit: type=1334 audit(1734061249.829:95): prog-id=4 op=UNLOAD Dec 13 03:40:51.448885 systemd[1]: Stopped iscsid.service. Dec 13 03:40:51.448891 kernel: audit: type=1334 audit(1734061249.829:96): prog-id=5 op=UNLOAD Dec 13 03:40:51.448897 kernel: audit: type=1131 audit(1734061249.830:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.448903 kernel: audit: type=1334 audit(1734061249.986:98): prog-id=12 op=UNLOAD Dec 13 03:40:51.448909 kernel: audit: type=1131 audit(1734061249.999:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.448916 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 03:40:51.448922 systemd[1]: Stopped initrd-switch-root.service. Dec 13 03:40:51.448930 kernel: audit: type=1130 audit(1734061250.107:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.448936 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 03:40:51.448944 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 03:40:51.448951 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 03:40:51.448957 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 03:40:51.448964 systemd[1]: Created slice system-getty.slice. Dec 13 03:40:51.448971 systemd[1]: Created slice system-modprobe.slice. Dec 13 03:40:51.448977 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 03:40:51.448984 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 03:40:51.448990 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 03:40:51.448997 systemd[1]: Created slice user.slice. Dec 13 03:40:51.449003 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:40:51.449010 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 03:40:51.449017 systemd[1]: Set up automount boot.automount. Dec 13 03:40:51.449023 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 03:40:51.449030 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 03:40:51.449036 systemd[1]: Stopped target initrd-fs.target. Dec 13 03:40:51.449042 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 03:40:51.449049 systemd[1]: Reached target integritysetup.target. Dec 13 03:40:51.449055 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:40:51.449061 systemd[1]: Reached target remote-fs.target. Dec 13 03:40:51.449069 systemd[1]: Reached target slices.target. Dec 13 03:40:51.449075 systemd[1]: Reached target swap.target. Dec 13 03:40:51.449082 systemd[1]: Reached target torcx.target. Dec 13 03:40:51.449088 systemd[1]: Reached target veritysetup.target. Dec 13 03:40:51.449094 systemd[1]: Listening on systemd-coredump.socket. Dec 13 03:40:51.449101 systemd[1]: Listening on systemd-initctl.socket. Dec 13 03:40:51.449109 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:40:51.449115 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:40:51.449122 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:40:51.449128 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 03:40:51.449135 systemd[1]: Mounting dev-hugepages.mount... Dec 13 03:40:51.449142 systemd[1]: Mounting dev-mqueue.mount... Dec 13 03:40:51.449148 systemd[1]: Mounting media.mount... Dec 13 03:40:51.449155 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:51.449162 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 03:40:51.449169 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 03:40:51.449175 systemd[1]: Mounting tmp.mount... Dec 13 03:40:51.449182 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 03:40:51.449188 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:40:51.449195 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:40:51.449201 systemd[1]: Starting modprobe@configfs.service... Dec 13 03:40:51.449208 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:40:51.449214 systemd[1]: Starting modprobe@drm.service... Dec 13 03:40:51.449222 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:40:51.449228 systemd[1]: Starting modprobe@fuse.service... Dec 13 03:40:51.449235 kernel: fuse: init (API version 7.34) Dec 13 03:40:51.449241 systemd[1]: Starting modprobe@loop.service... Dec 13 03:40:51.449247 kernel: loop: module loaded Dec 13 03:40:51.449253 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 03:40:51.449260 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 03:40:51.449267 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 03:40:51.449274 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 03:40:51.449281 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 03:40:51.449288 systemd[1]: Stopped systemd-journald.service. Dec 13 03:40:51.449294 systemd[1]: Starting systemd-journald.service... Dec 13 03:40:51.449301 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:40:51.449309 systemd-journald[1250]: Journal started Dec 13 03:40:51.449334 systemd-journald[1250]: Runtime Journal (/run/log/journal/0757388228054fa8a7f1dcbe930a298f) is 8.0M, max 640.1M, 632.1M free. Dec 13 03:40:47.837000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 03:40:48.107000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:40:48.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:40:48.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:40:48.109000 audit: BPF prog-id=10 op=LOAD Dec 13 03:40:48.109000 audit: BPF prog-id=10 op=UNLOAD Dec 13 03:40:48.110000 audit: BPF prog-id=11 op=LOAD Dec 13 03:40:48.110000 audit: BPF prog-id=11 op=UNLOAD Dec 13 03:40:48.187000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 03:40:48.187000 audit[1139]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:48.187000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:40:48.212000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 03:40:48.212000 audit[1139]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:48.212000 audit: CWD cwd="/" Dec 13 03:40:48.212000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:48.212000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:48.212000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:40:49.739000 audit: BPF prog-id=12 op=LOAD Dec 13 03:40:49.739000 audit: BPF prog-id=3 op=UNLOAD Dec 13 03:40:49.784000 audit: BPF prog-id=13 op=LOAD Dec 13 03:40:49.829000 audit: BPF prog-id=14 op=LOAD Dec 13 03:40:49.829000 audit: BPF prog-id=4 op=UNLOAD Dec 13 03:40:49.829000 audit: BPF prog-id=5 op=UNLOAD Dec 13 03:40:49.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:49.986000 audit: BPF prog-id=12 op=UNLOAD Dec 13 03:40:49.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:50.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:50.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.421000 audit: BPF prog-id=15 op=LOAD Dec 13 03:40:51.421000 audit: BPF prog-id=16 op=LOAD Dec 13 03:40:51.421000 audit: BPF prog-id=17 op=LOAD Dec 13 03:40:51.422000 audit: BPF prog-id=13 op=UNLOAD Dec 13 03:40:51.422000 audit: BPF prog-id=14 op=UNLOAD Dec 13 03:40:51.445000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:40:51.445000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe34dc3240 a2=4000 a3=7ffe34dc32dc items=0 ppid=1 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:51.445000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:40:48.186315 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:40:49.738842 systemd[1]: Queued start job for default target multi-user.target. Dec 13 03:40:48.186749 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:40:49.831294 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 03:40:48.186764 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:40:48.186788 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 03:40:48.186796 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 03:40:48.186817 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 03:40:48.186826 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 03:40:48.186965 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 03:40:48.186995 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:40:48.187004 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:40:48.187715 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 03:40:48.187742 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 03:40:48.187757 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 03:40:48.187767 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 03:40:48.187780 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 03:40:48.187790 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 03:40:49.382902 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:40:49.383042 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:40:49.383095 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:40:49.383187 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:40:49.383217 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 03:40:49.383251 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-12-13T03:40:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 03:40:51.480516 systemd[1]: Starting systemd-network-generator.service... Dec 13 03:40:51.503373 systemd[1]: Starting systemd-remount-fs.service... Dec 13 03:40:51.526381 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:40:51.558915 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 03:40:51.558936 systemd[1]: Stopped verity-setup.service. Dec 13 03:40:51.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.593382 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:51.608529 systemd[1]: Started systemd-journald.service. Dec 13 03:40:51.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.616873 systemd[1]: Mounted dev-hugepages.mount. Dec 13 03:40:51.625703 systemd[1]: Mounted dev-mqueue.mount. Dec 13 03:40:51.632614 systemd[1]: Mounted media.mount. Dec 13 03:40:51.639610 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 03:40:51.648604 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 03:40:51.657568 systemd[1]: Mounted tmp.mount. Dec 13 03:40:51.664686 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 03:40:51.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.673692 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:40:51.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.682763 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 03:40:51.682882 systemd[1]: Finished modprobe@configfs.service. Dec 13 03:40:51.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.691823 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:40:51.691977 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:40:51.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.701014 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:40:51.701243 systemd[1]: Finished modprobe@drm.service. Dec 13 03:40:51.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.710216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:40:51.710705 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:40:51.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.720173 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 03:40:51.720494 systemd[1]: Finished modprobe@fuse.service. Dec 13 03:40:51.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.729171 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:40:51.729496 systemd[1]: Finished modprobe@loop.service. Dec 13 03:40:51.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.738205 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:40:51.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.747357 systemd[1]: Finished systemd-network-generator.service. Dec 13 03:40:51.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.756181 systemd[1]: Finished systemd-remount-fs.service. Dec 13 03:40:51.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.765155 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:40:51.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.774852 systemd[1]: Reached target network-pre.target. Dec 13 03:40:51.786295 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 03:40:51.795065 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 03:40:51.802537 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 03:40:51.803589 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 03:40:51.811020 systemd[1]: Starting systemd-journal-flush.service... Dec 13 03:40:51.814585 systemd-journald[1250]: Time spent on flushing to /var/log/journal/0757388228054fa8a7f1dcbe930a298f is 15.002ms for 1580 entries. Dec 13 03:40:51.814585 systemd-journald[1250]: System Journal (/var/log/journal/0757388228054fa8a7f1dcbe930a298f) is 8.0M, max 195.6M, 187.6M free. Dec 13 03:40:51.858038 systemd-journald[1250]: Received client request to flush runtime journal. Dec 13 03:40:51.827471 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:40:51.828010 systemd[1]: Starting systemd-random-seed.service... Dec 13 03:40:51.838441 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:40:51.838943 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:40:51.845970 systemd[1]: Starting systemd-sysusers.service... Dec 13 03:40:51.852945 systemd[1]: Starting systemd-udev-settle.service... Dec 13 03:40:51.860514 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 03:40:51.868537 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 03:40:51.876573 systemd[1]: Finished systemd-journal-flush.service. Dec 13 03:40:51.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.884578 systemd[1]: Finished systemd-random-seed.service. Dec 13 03:40:51.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.892570 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:40:51.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.900552 systemd[1]: Finished systemd-sysusers.service. Dec 13 03:40:51.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:51.909542 systemd[1]: Reached target first-boot-complete.target. Dec 13 03:40:51.917675 udevadm[1266]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 03:40:52.108031 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 03:40:52.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:52.117000 audit: BPF prog-id=18 op=LOAD Dec 13 03:40:52.117000 audit: BPF prog-id=19 op=LOAD Dec 13 03:40:52.117000 audit: BPF prog-id=7 op=UNLOAD Dec 13 03:40:52.117000 audit: BPF prog-id=8 op=UNLOAD Dec 13 03:40:52.118649 systemd[1]: Starting systemd-udevd.service... Dec 13 03:40:52.130183 systemd-udevd[1267]: Using default interface naming scheme 'v252'. Dec 13 03:40:52.153219 systemd[1]: Started systemd-udevd.service. Dec 13 03:40:52.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:52.163735 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 03:40:52.163000 audit: BPF prog-id=20 op=LOAD Dec 13 03:40:52.165070 systemd[1]: Starting systemd-networkd.service... Dec 13 03:40:52.184000 audit: BPF prog-id=21 op=LOAD Dec 13 03:40:52.186360 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 03:40:52.185000 audit: BPF prog-id=22 op=LOAD Dec 13 03:40:52.185000 audit: BPF prog-id=23 op=LOAD Dec 13 03:40:52.186867 systemd[1]: Starting systemd-userdbd.service... Dec 13 03:40:52.214201 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 03:40:52.214283 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 03:40:52.214313 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 03:40:52.231356 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1286) Dec 13 03:40:52.251347 kernel: ACPI: button: Power Button [PWRF] Dec 13 03:40:52.281351 kernel: IPMI message handler: version 39.2 Dec 13 03:40:52.285474 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:40:52.220000 audit[1334]: AVC avc: denied { confidentiality } for pid=1334 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:40:52.297583 systemd[1]: Started systemd-userdbd.service. Dec 13 03:40:52.308375 kernel: ipmi device interface Dec 13 03:40:52.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:52.326349 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 03:40:52.424480 kernel: ipmi_si: IPMI System Interface driver Dec 13 03:40:52.424502 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 03:40:52.424600 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 03:40:52.424674 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 03:40:52.424688 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 03:40:52.424706 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 03:40:52.424785 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 03:40:52.558941 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 03:40:52.559039 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 03:40:52.559054 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 03:40:52.559142 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 03:40:52.559227 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 03:40:52.559299 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 03:40:52.559316 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 03:40:52.220000 audit[1334]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ce446c7df0 a1=4d98c a2=7fcc1d0f9bc5 a3=5 items=42 ppid=1267 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:52.220000 audit: CWD cwd="/" Dec 13 03:40:52.220000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=1 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=2 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=3 name=(null) inode=23051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=4 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=5 name=(null) inode=23052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=6 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=7 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=8 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=9 name=(null) inode=23054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=10 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=11 name=(null) inode=23055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=12 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=13 name=(null) inode=23056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=14 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=15 name=(null) inode=23057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=16 name=(null) inode=23053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=17 name=(null) inode=23058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=18 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=19 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=20 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=21 name=(null) inode=23060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=22 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=23 name=(null) inode=23061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=24 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=25 name=(null) inode=23062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=26 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=27 name=(null) inode=23063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=28 name=(null) inode=23059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=29 name=(null) inode=23064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=30 name=(null) inode=23050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=31 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=32 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=33 name=(null) inode=23066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=34 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=35 name=(null) inode=23067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=36 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=37 name=(null) inode=23068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=38 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=39 name=(null) inode=23069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=40 name=(null) inode=23065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PATH item=41 name=(null) inode=23070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:52.220000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 03:40:52.599348 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 03:40:52.651017 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 03:40:52.651098 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 03:40:52.651161 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 03:40:52.649291 systemd-networkd[1297]: bond0: netdev ready Dec 13 03:40:52.651289 systemd-networkd[1297]: lo: Link UP Dec 13 03:40:52.651292 systemd-networkd[1297]: lo: Gained carrier Dec 13 03:40:52.651765 systemd-networkd[1297]: Enumeration completed Dec 13 03:40:52.651853 systemd[1]: Started systemd-networkd.service. Dec 13 03:40:52.652050 systemd-networkd[1297]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 03:40:52.652746 systemd-networkd[1297]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:15:b7:75.network. Dec 13 03:40:52.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:52.721016 kernel: intel_rapl_common: Found RAPL domain package Dec 13 03:40:52.721059 kernel: intel_rapl_common: Found RAPL domain core Dec 13 03:40:52.721085 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 03:40:52.736945 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 03:40:52.773467 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 03:40:52.821390 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:40:52.843144 systemd-networkd[1297]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:15:b7:74.network. Dec 13 03:40:52.843345 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 03:40:52.878378 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:40:53.016456 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 03:40:53.068461 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 03:40:53.092439 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 03:40:53.111394 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 03:40:53.159796 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:40:53.159822 kernel: bond0: active interface up! Dec 13 03:40:53.183136 systemd-networkd[1297]: bond0: Link UP Dec 13 03:40:53.183344 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 03:40:53.183685 systemd-networkd[1297]: enp1s0f1np1: Link UP Dec 13 03:40:53.183823 systemd-networkd[1297]: enp1s0f1np1: Gained carrier Dec 13 03:40:53.184840 systemd-networkd[1297]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:15:b7:74.network. Dec 13 03:40:53.196653 systemd[1]: Finished systemd-udev-settle.service. Dec 13 03:40:53.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.205090 systemd[1]: Starting lvm2-activation-early.service... Dec 13 03:40:53.220572 lvm[1370]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:40:53.256746 systemd[1]: Finished lvm2-activation-early.service. Dec 13 03:40:53.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.265503 systemd[1]: Reached target cryptsetup.target. Dec 13 03:40:53.274038 systemd[1]: Starting lvm2-activation.service... Dec 13 03:40:53.276188 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:40:53.310343 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.315740 systemd[1]: Finished lvm2-activation.service. Dec 13 03:40:53.333342 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.349545 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:40:53.357342 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.373442 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 03:40:53.373456 systemd[1]: Reached target local-fs.target. Dec 13 03:40:53.379343 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.396432 systemd[1]: Reached target machines.target. Dec 13 03:40:53.401342 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.419036 systemd[1]: Starting ldconfig.service... Dec 13 03:40:53.423344 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.438860 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:40:53.438881 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:53.439415 systemd[1]: Starting systemd-boot-update.service... Dec 13 03:40:53.443345 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.459885 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 03:40:53.465161 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 03:40:53.465344 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.465684 systemd[1]: Starting systemd-sysext.service... Dec 13 03:40:53.465920 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1373 (bootctl) Dec 13 03:40:53.466469 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 03:40:53.486347 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.506378 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.525382 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.525547 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 03:40:53.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.527548 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 03:40:53.545092 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 03:40:53.545173 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 03:40:53.545343 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.566410 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.566438 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 03:40:53.580374 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.618345 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.638395 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.657345 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.657874 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 03:40:53.658210 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 03:40:53.672347 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 03:40:53.672387 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.689832 systemd-networkd[1297]: enp1s0f0np0: Link UP Dec 13 03:40:53.690016 systemd-networkd[1297]: bond0: Gained carrier Dec 13 03:40:53.690109 systemd-networkd[1297]: enp1s0f0np0: Gained carrier Dec 13 03:40:53.693057 systemd-fsck[1382]: fsck.fat 4.2 (2021-01-31) Dec 13 03:40:53.693057 systemd-fsck[1382]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 03:40:53.706826 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 03:40:53.709354 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 03:40:53.709420 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 03:40:53.710766 systemd-networkd[1297]: enp1s0f1np1: Link DOWN Dec 13 03:40:53.710769 systemd-networkd[1297]: enp1s0f1np1: Lost carrier Dec 13 03:40:53.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.734105 systemd[1]: Mounting boot.mount... Dec 13 03:40:53.744772 systemd[1]: Mounted boot.mount. Dec 13 03:40:53.762375 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 03:40:53.770350 systemd[1]: Finished systemd-boot-update.service. Dec 13 03:40:53.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.780648 (sd-sysext)[1387]: Using extensions 'kubernetes'. Dec 13 03:40:53.780833 (sd-sysext)[1387]: Merged extensions into '/usr'. Dec 13 03:40:53.790565 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:53.791334 systemd[1]: Mounting usr-share-oem.mount... Dec 13 03:40:53.799494 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:40:53.800122 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:40:53.808938 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:40:53.817001 systemd[1]: Starting modprobe@loop.service... Dec 13 03:40:53.823463 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:40:53.823561 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:53.823654 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:53.825262 systemd[1]: Mounted usr-share-oem.mount. Dec 13 03:40:53.832601 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:40:53.832688 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:40:53.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.840617 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:40:53.840677 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:40:53.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.848631 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:40:53.848692 systemd[1]: Finished modprobe@loop.service. Dec 13 03:40:53.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.860962 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:40:53.861032 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:40:53.861608 systemd[1]: Finished systemd-sysext.service. Dec 13 03:40:53.869383 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 03:40:53.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.885202 systemd[1]: Starting ensure-sysext.service... Dec 13 03:40:53.887345 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Dec 13 03:40:53.887809 systemd-networkd[1297]: enp1s0f1np1: Link UP Dec 13 03:40:53.888006 systemd-networkd[1297]: enp1s0f1np1: Gained carrier Dec 13 03:40:53.890632 ldconfig[1372]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 03:40:53.895066 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 03:40:53.903664 systemd[1]: Finished ldconfig.service. Dec 13 03:40:53.906524 systemd-tmpfiles[1394]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 03:40:53.910141 systemd-tmpfiles[1394]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 03:40:53.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:53.912829 systemd[1]: Reloading. Dec 13 03:40:53.913743 systemd-tmpfiles[1394]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 03:40:53.929351 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 03:40:53.938802 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-12-13T03:40:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:40:53.938821 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-12-13T03:40:53Z" level=info msg="torcx already run" Dec 13 03:40:53.947388 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 03:40:53.989085 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:40:53.989095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:40:54.000515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:40:54.041000 audit: BPF prog-id=24 op=LOAD Dec 13 03:40:54.041000 audit: BPF prog-id=20 op=UNLOAD Dec 13 03:40:54.041000 audit: BPF prog-id=25 op=LOAD Dec 13 03:40:54.041000 audit: BPF prog-id=15 op=UNLOAD Dec 13 03:40:54.041000 audit: BPF prog-id=26 op=LOAD Dec 13 03:40:54.041000 audit: BPF prog-id=27 op=LOAD Dec 13 03:40:54.041000 audit: BPF prog-id=16 op=UNLOAD Dec 13 03:40:54.041000 audit: BPF prog-id=17 op=UNLOAD Dec 13 03:40:54.042000 audit: BPF prog-id=28 op=LOAD Dec 13 03:40:54.042000 audit: BPF prog-id=29 op=LOAD Dec 13 03:40:54.042000 audit: BPF prog-id=18 op=UNLOAD Dec 13 03:40:54.042000 audit: BPF prog-id=19 op=UNLOAD Dec 13 03:40:54.043000 audit: BPF prog-id=30 op=LOAD Dec 13 03:40:54.043000 audit: BPF prog-id=21 op=UNLOAD Dec 13 03:40:54.043000 audit: BPF prog-id=31 op=LOAD Dec 13 03:40:54.043000 audit: BPF prog-id=32 op=LOAD Dec 13 03:40:54.043000 audit: BPF prog-id=22 op=UNLOAD Dec 13 03:40:54.043000 audit: BPF prog-id=23 op=UNLOAD Dec 13 03:40:54.046444 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 03:40:54.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:54.056309 systemd[1]: Starting audit-rules.service... Dec 13 03:40:54.063966 systemd[1]: Starting clean-ca-certificates.service... Dec 13 03:40:54.073049 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 03:40:54.073000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 03:40:54.073000 audit[1492]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda0e2fb50 a2=420 a3=0 items=0 ppid=1475 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:54.073000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 03:40:54.075045 augenrules[1492]: No rules Dec 13 03:40:54.082427 systemd[1]: Starting systemd-resolved.service... Dec 13 03:40:54.090378 systemd[1]: Starting systemd-timesyncd.service... Dec 13 03:40:54.097943 systemd[1]: Starting systemd-update-utmp.service... Dec 13 03:40:54.104740 systemd[1]: Finished audit-rules.service. Dec 13 03:40:54.111552 systemd[1]: Finished clean-ca-certificates.service. Dec 13 03:40:54.119576 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 03:40:54.133586 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.134327 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:40:54.141990 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:40:54.148987 systemd[1]: Starting modprobe@loop.service... Dec 13 03:40:54.155409 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.155508 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:54.156226 systemd[1]: Starting systemd-update-done.service... Dec 13 03:40:54.161587 systemd-resolved[1497]: Positive Trust Anchors: Dec 13 03:40:54.161592 systemd-resolved[1497]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:40:54.161610 systemd-resolved[1497]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:40:54.163433 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:40:54.164243 systemd[1]: Started systemd-timesyncd.service. Dec 13 03:40:54.165676 systemd-resolved[1497]: Using system hostname 'ci-3510.3.6-a-cc0c4ef4b9'. Dec 13 03:40:54.173721 systemd[1]: Started systemd-resolved.service. Dec 13 03:40:54.182692 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:40:54.182784 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:40:54.190676 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:40:54.190766 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:40:54.198664 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:40:54.198753 systemd[1]: Finished modprobe@loop.service. Dec 13 03:40:54.206685 systemd[1]: Finished systemd-update-done.service. Dec 13 03:40:54.214724 systemd[1]: Reached target network.target. Dec 13 03:40:54.222497 systemd[1]: Reached target nss-lookup.target. Dec 13 03:40:54.230485 systemd[1]: Reached target time-set.target. Dec 13 03:40:54.238471 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:40:54.238556 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.238870 systemd[1]: Finished systemd-update-utmp.service. Dec 13 03:40:54.248612 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.249298 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:40:54.256962 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:40:54.263929 systemd[1]: Starting modprobe@loop.service... Dec 13 03:40:54.270440 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.270533 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:54.270616 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:40:54.271091 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:40:54.271174 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:40:54.279657 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:40:54.279737 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:40:54.287600 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:40:54.287680 systemd[1]: Finished modprobe@loop.service. Dec 13 03:40:54.295591 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:40:54.295694 systemd[1]: Reached target sysinit.target. Dec 13 03:40:54.303516 systemd[1]: Started motdgen.path. Dec 13 03:40:54.310483 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 03:40:54.320546 systemd[1]: Started logrotate.timer. Dec 13 03:40:54.327518 systemd[1]: Started mdadm.timer. Dec 13 03:40:54.334468 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 03:40:54.342443 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:40:54.342531 systemd[1]: Reached target paths.target. Dec 13 03:40:54.349458 systemd[1]: Reached target timers.target. Dec 13 03:40:54.356630 systemd[1]: Listening on dbus.socket. Dec 13 03:40:54.363937 systemd[1]: Starting docker.socket... Dec 13 03:40:54.371889 systemd[1]: Listening on sshd.socket. Dec 13 03:40:54.378523 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:54.378589 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.379284 systemd[1]: Listening on docker.socket. Dec 13 03:40:54.387269 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:40:54.387328 systemd[1]: Reached target sockets.target. Dec 13 03:40:54.395488 systemd[1]: Reached target basic.target. Dec 13 03:40:54.402469 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.402523 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:40:54.403053 systemd[1]: Starting containerd.service... Dec 13 03:40:54.409966 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 03:40:54.419978 systemd[1]: Starting coreos-metadata.service... Dec 13 03:40:54.427142 systemd[1]: Starting dbus.service... Dec 13 03:40:54.433038 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 03:40:54.437164 jq[1518]: false Dec 13 03:40:54.439204 coreos-metadata[1511]: Dec 13 03:40:54.439 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:40:54.440184 systemd[1]: Starting extend-filesystems.service... Dec 13 03:40:54.444525 dbus-daemon[1517]: [system] SELinux support is enabled Dec 13 03:40:54.446472 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 03:40:54.447262 systemd[1]: Starting modprobe@drm.service... Dec 13 03:40:54.447693 extend-filesystems[1520]: Found loop1 Dec 13 03:40:54.447693 extend-filesystems[1520]: Found sda Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda1 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda2 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda3 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found usr Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda4 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda6 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda7 Dec 13 03:40:54.472834 extend-filesystems[1520]: Found sda9 Dec 13 03:40:54.472834 extend-filesystems[1520]: Checking size of /dev/sda9 Dec 13 03:40:54.472834 extend-filesystems[1520]: Resized partition /dev/sda9 Dec 13 03:40:54.574453 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Dec 13 03:40:54.574473 coreos-metadata[1514]: Dec 13 03:40:54.449 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 03:40:54.455146 systemd[1]: Starting motdgen.service... Dec 13 03:40:54.574642 extend-filesystems[1529]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 03:40:54.484348 systemd[1]: Starting prepare-helm.service... Dec 13 03:40:54.503063 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 03:40:54.521978 systemd[1]: Starting sshd-keygen.service... Dec 13 03:40:54.540044 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 03:40:54.558438 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:40:54.559215 systemd[1]: Starting tcsd.service... Dec 13 03:40:54.579644 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 03:40:54.580051 systemd[1]: Starting update-engine.service... Dec 13 03:40:54.594994 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 03:40:54.596414 jq[1550]: true Dec 13 03:40:54.605369 systemd[1]: Started dbus.service. Dec 13 03:40:54.614263 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 03:40:54.614361 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 03:40:54.614601 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:40:54.614669 systemd[1]: Finished modprobe@drm.service. Dec 13 03:40:54.623625 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 03:40:54.623737 systemd[1]: Finished motdgen.service. Dec 13 03:40:54.624844 update_engine[1549]: I1213 03:40:54.624325 1549 main.cc:92] Flatcar Update Engine starting Dec 13 03:40:54.627688 update_engine[1549]: I1213 03:40:54.627673 1549 update_check_scheduler.cc:74] Next update check in 11m10s Dec 13 03:40:54.631048 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 03:40:54.631130 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 03:40:54.643019 jq[1554]: true Dec 13 03:40:54.643809 systemd[1]: Finished ensure-sysext.service. Dec 13 03:40:54.651501 env[1555]: time="2024-12-13T03:40:54.651470043Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 03:40:54.658547 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 03:40:54.658638 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 03:40:54.658824 tar[1552]: linux-amd64/helm Dec 13 03:40:54.660172 env[1555]: time="2024-12-13T03:40:54.660151203Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 03:40:54.660229 env[1555]: time="2024-12-13T03:40:54.660221075Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661147 env[1555]: time="2024-12-13T03:40:54.661040549Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661186 env[1555]: time="2024-12-13T03:40:54.661149624Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661312 env[1555]: time="2024-12-13T03:40:54.661295944Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661353 env[1555]: time="2024-12-13T03:40:54.661312655Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661353 env[1555]: time="2024-12-13T03:40:54.661324242Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 03:40:54.661353 env[1555]: time="2024-12-13T03:40:54.661333164Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661410 env[1555]: time="2024-12-13T03:40:54.661392081Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661534 env[1555]: time="2024-12-13T03:40:54.661524661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661608 env[1555]: time="2024-12-13T03:40:54.661596979Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:40:54.661608 env[1555]: time="2024-12-13T03:40:54.661606901Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 03:40:54.661663 env[1555]: time="2024-12-13T03:40:54.661632831Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 03:40:54.661663 env[1555]: time="2024-12-13T03:40:54.661641263Z" level=info msg="metadata content store policy set" policy=shared Dec 13 03:40:54.664528 systemd[1]: Started update-engine.service. Dec 13 03:40:54.672715 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:54.673668 systemd[1]: Started locksmithd.service. Dec 13 03:40:54.677069 env[1555]: time="2024-12-13T03:40:54.677049195Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 03:40:54.677113 env[1555]: time="2024-12-13T03:40:54.677073505Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 03:40:54.677113 env[1555]: time="2024-12-13T03:40:54.677082289Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 03:40:54.677113 env[1555]: time="2024-12-13T03:40:54.677099841Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.677113 env[1555]: time="2024-12-13T03:40:54.677108428Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677115743Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677122620Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677131848Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677141304Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677149153Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677156772Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.678737 env[1555]: time="2024-12-13T03:40:54.677164667Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 03:40:54.678859 env[1555]: time="2024-12-13T03:40:54.678777776Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 03:40:54.678859 env[1555]: time="2024-12-13T03:40:54.678847643Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 03:40:54.679005 env[1555]: time="2024-12-13T03:40:54.678992957Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 03:40:54.679025 env[1555]: time="2024-12-13T03:40:54.679014621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679045 env[1555]: time="2024-12-13T03:40:54.679023242Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 03:40:54.679065 env[1555]: time="2024-12-13T03:40:54.679058726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679085 env[1555]: time="2024-12-13T03:40:54.679067771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679085 env[1555]: time="2024-12-13T03:40:54.679075402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679085 env[1555]: time="2024-12-13T03:40:54.679081559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679146 env[1555]: time="2024-12-13T03:40:54.679087920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679146 env[1555]: time="2024-12-13T03:40:54.679095217Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679146 env[1555]: time="2024-12-13T03:40:54.679101625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679146 env[1555]: time="2024-12-13T03:40:54.679107869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679146 env[1555]: time="2024-12-13T03:40:54.679115440Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679191822Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679201804Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679208420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679216587Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679225300Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 03:40:54.679241 env[1555]: time="2024-12-13T03:40:54.679232069Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 03:40:54.679337 env[1555]: time="2024-12-13T03:40:54.679241888Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 03:40:54.679337 env[1555]: time="2024-12-13T03:40:54.679262774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 03:40:54.679406 env[1555]: time="2024-12-13T03:40:54.679381449Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679413708Z" level=info msg="Connect containerd service" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679432480Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679712476Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679804886Z" level=info msg="Start subscribing containerd event" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679829829Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679833549Z" level=info msg="Start recovering state" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679856817Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679874419Z" level=info msg="Start event monitor" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679879621Z" level=info msg="containerd successfully booted in 0.028752s" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679880844Z" level=info msg="Start snapshots syncer" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679888825Z" level=info msg="Start cni network conf syncer for default" Dec 13 03:40:54.686109 env[1555]: time="2024-12-13T03:40:54.679893576Z" level=info msg="Start streaming server" Dec 13 03:40:54.686310 bash[1586]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:40:54.681445 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 03:40:54.681472 systemd[1]: Reached target system-config.target. Dec 13 03:40:54.690749 systemd[1]: Starting systemd-logind.service... Dec 13 03:40:54.697426 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 03:40:54.697456 systemd[1]: Reached target user-config.target. Dec 13 03:40:54.705388 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:40:54.705525 systemd[1]: Started containerd.service. Dec 13 03:40:54.712593 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 03:40:54.713059 systemd-logind[1593]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 03:40:54.713070 systemd-logind[1593]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 03:40:54.713081 systemd-logind[1593]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 03:40:54.713192 systemd-logind[1593]: New seat seat0. Dec 13 03:40:54.723604 systemd[1]: Started systemd-logind.service. Dec 13 03:40:54.733181 locksmithd[1589]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 03:40:54.909548 tar[1552]: linux-amd64/LICENSE Dec 13 03:40:54.909628 tar[1552]: linux-amd64/README.md Dec 13 03:40:54.912351 systemd[1]: Finished prepare-helm.service. Dec 13 03:40:54.922462 systemd-networkd[1297]: bond0: Gained IPv6LL Dec 13 03:40:54.970373 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Dec 13 03:40:55.001312 extend-filesystems[1529]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 03:40:55.001312 extend-filesystems[1529]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 03:40:55.001312 extend-filesystems[1529]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Dec 13 03:40:55.038390 extend-filesystems[1520]: Resized filesystem in /dev/sda9 Dec 13 03:40:55.038390 extend-filesystems[1520]: Found sdb Dec 13 03:40:55.001733 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 03:40:55.053495 sshd_keygen[1546]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 03:40:55.001812 systemd[1]: Finished extend-filesystems.service. Dec 13 03:40:55.053128 systemd[1]: Finished sshd-keygen.service. Dec 13 03:40:55.061259 systemd[1]: Starting issuegen.service... Dec 13 03:40:55.067625 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 03:40:55.067699 systemd[1]: Finished issuegen.service. Dec 13 03:40:55.075427 systemd[1]: Starting systemd-user-sessions.service... Dec 13 03:40:55.083767 systemd[1]: Finished systemd-user-sessions.service. Dec 13 03:40:55.093253 systemd[1]: Started getty@tty1.service. Dec 13 03:40:55.101313 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 03:40:55.109618 systemd[1]: Reached target getty.target. Dec 13 03:40:55.181338 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 03:40:55.187405 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 03:40:55.197858 systemd[1]: Reached target network-online.target. Dec 13 03:40:55.207524 systemd[1]: Starting kubelet.service... Dec 13 03:40:55.875065 systemd[1]: Started kubelet.service. Dec 13 03:40:56.622608 kubelet[1625]: E1213 03:40:56.622532 1625 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:40:56.624167 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:40:56.624258 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:41:00.121021 login[1615]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:41:00.128087 login[1614]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 03:41:00.128535 systemd-logind[1593]: New session 1 of user core. Dec 13 03:41:00.129068 systemd[1]: Created slice user-500.slice. Dec 13 03:41:00.129635 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 03:41:00.130858 systemd-logind[1593]: New session 2 of user core. Dec 13 03:41:00.135213 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 03:41:00.135918 systemd[1]: Starting user@500.service... Dec 13 03:41:00.137742 (systemd)[1642]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:00.204173 systemd[1642]: Queued start job for default target default.target. Dec 13 03:41:00.204410 systemd[1642]: Reached target paths.target. Dec 13 03:41:00.204422 systemd[1642]: Reached target sockets.target. Dec 13 03:41:00.204430 systemd[1642]: Reached target timers.target. Dec 13 03:41:00.204438 systemd[1642]: Reached target basic.target. Dec 13 03:41:00.204457 systemd[1642]: Reached target default.target. Dec 13 03:41:00.204471 systemd[1642]: Startup finished in 63ms. Dec 13 03:41:00.204517 systemd[1]: Started user@500.service. Dec 13 03:41:00.205069 systemd[1]: Started session-1.scope. Dec 13 03:41:00.205424 systemd[1]: Started session-2.scope. Dec 13 03:41:00.298517 coreos-metadata[1511]: Dec 13 03:41:00.298 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:41:00.299268 coreos-metadata[1514]: Dec 13 03:41:00.298 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 03:41:01.239759 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 03:41:01.239925 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 03:41:01.298855 coreos-metadata[1514]: Dec 13 03:41:01.298 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:41:01.298970 coreos-metadata[1511]: Dec 13 03:41:01.298 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 03:41:01.500215 systemd-timesyncd[1498]: Contacted time server 96.60.160.227:123 (0.flatcar.pool.ntp.org). Dec 13 03:41:01.500390 systemd-timesyncd[1498]: Initial clock synchronization to Fri 2024-12-13 03:41:01.315888 UTC. Dec 13 03:41:01.671649 systemd[1]: Created slice system-sshd.slice. Dec 13 03:41:01.672319 systemd[1]: Started sshd@0-147.75.202.177:22-139.178.68.195:45072.service. Dec 13 03:41:01.715789 sshd[1663]: Accepted publickey for core from 139.178.68.195 port 45072 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:01.717059 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:01.721772 systemd-logind[1593]: New session 3 of user core. Dec 13 03:41:01.722786 systemd[1]: Started session-3.scope. Dec 13 03:41:01.781145 systemd[1]: Started sshd@1-147.75.202.177:22-139.178.68.195:45086.service. Dec 13 03:41:01.811724 sshd[1668]: Accepted publickey for core from 139.178.68.195 port 45086 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:01.812425 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:01.814782 systemd-logind[1593]: New session 4 of user core. Dec 13 03:41:01.815215 systemd[1]: Started session-4.scope. Dec 13 03:41:01.864898 sshd[1668]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:01.867042 systemd[1]: sshd@1-147.75.202.177:22-139.178.68.195:45086.service: Deactivated successfully. Dec 13 03:41:01.867514 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 03:41:01.868026 systemd-logind[1593]: Session 4 logged out. Waiting for processes to exit. Dec 13 03:41:01.868923 systemd[1]: Started sshd@2-147.75.202.177:22-139.178.68.195:45092.service. Dec 13 03:41:01.869619 systemd-logind[1593]: Removed session 4. Dec 13 03:41:01.902292 sshd[1674]: Accepted publickey for core from 139.178.68.195 port 45092 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:01.903222 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:01.906623 systemd-logind[1593]: New session 5 of user core. Dec 13 03:41:01.907272 systemd[1]: Started session-5.scope. Dec 13 03:41:01.962127 sshd[1674]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:01.963364 systemd[1]: sshd@2-147.75.202.177:22-139.178.68.195:45092.service: Deactivated successfully. Dec 13 03:41:01.963756 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 03:41:01.964152 systemd-logind[1593]: Session 5 logged out. Waiting for processes to exit. Dec 13 03:41:01.964781 systemd-logind[1593]: Removed session 5. Dec 13 03:41:01.991673 coreos-metadata[1511]: Dec 13 03:41:01.991 INFO Fetch successful Dec 13 03:41:02.043183 unknown[1511]: wrote ssh authorized keys file for user: core Dec 13 03:41:02.056643 update-ssh-keys[1679]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:41:02.056939 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 03:41:02.130264 coreos-metadata[1514]: Dec 13 03:41:02.130 INFO Fetch successful Dec 13 03:41:02.206963 systemd[1]: Finished coreos-metadata.service. Dec 13 03:41:02.207828 systemd[1]: Started packet-phone-home.service. Dec 13 03:41:02.207972 systemd[1]: Reached target multi-user.target. Dec 13 03:41:02.208626 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 03:41:02.212678 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 03:41:02.212759 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 03:41:02.213129 curl[1683]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 03:41:02.213261 curl[1683]: Dload Upload Total Spent Left Speed Dec 13 03:41:02.216600 systemd[1]: Startup finished in 1.863s (kernel) + 21.651s (initrd) + 14.720s (userspace) = 38.236s. Dec 13 03:41:02.623292 curl[1683]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 03:41:02.625709 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 03:41:06.695468 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 03:41:06.696011 systemd[1]: Stopped kubelet.service. Dec 13 03:41:06.697037 systemd[1]: Starting kubelet.service... Dec 13 03:41:06.902761 systemd[1]: Started kubelet.service. Dec 13 03:41:06.958836 kubelet[1690]: E1213 03:41:06.958729 1690 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:41:06.961460 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:41:06.961538 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:41:11.835325 systemd[1]: Started sshd@3-147.75.202.177:22-139.178.68.195:53054.service. Dec 13 03:41:11.866492 sshd[1709]: Accepted publickey for core from 139.178.68.195 port 53054 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:11.867132 sshd[1709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:11.869479 systemd-logind[1593]: New session 6 of user core. Dec 13 03:41:11.869917 systemd[1]: Started session-6.scope. Dec 13 03:41:11.920477 sshd[1709]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:11.921995 systemd[1]: sshd@3-147.75.202.177:22-139.178.68.195:53054.service: Deactivated successfully. Dec 13 03:41:11.922285 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 03:41:11.922716 systemd-logind[1593]: Session 6 logged out. Waiting for processes to exit. Dec 13 03:41:11.923212 systemd[1]: Started sshd@4-147.75.202.177:22-139.178.68.195:53058.service. Dec 13 03:41:11.923783 systemd-logind[1593]: Removed session 6. Dec 13 03:41:11.955395 sshd[1715]: Accepted publickey for core from 139.178.68.195 port 53058 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:11.956250 sshd[1715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:11.959138 systemd-logind[1593]: New session 7 of user core. Dec 13 03:41:11.959725 systemd[1]: Started session-7.scope. Dec 13 03:41:12.011853 sshd[1715]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:12.017826 systemd[1]: sshd@4-147.75.202.177:22-139.178.68.195:53058.service: Deactivated successfully. Dec 13 03:41:12.018114 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 03:41:12.018411 systemd-logind[1593]: Session 7 logged out. Waiting for processes to exit. Dec 13 03:41:12.018914 systemd[1]: Started sshd@5-147.75.202.177:22-139.178.68.195:53060.service. Dec 13 03:41:12.019323 systemd-logind[1593]: Removed session 7. Dec 13 03:41:12.050452 sshd[1721]: Accepted publickey for core from 139.178.68.195 port 53060 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:12.051287 sshd[1721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:12.053822 systemd-logind[1593]: New session 8 of user core. Dec 13 03:41:12.054414 systemd[1]: Started session-8.scope. Dec 13 03:41:12.112305 sshd[1721]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:12.118775 systemd[1]: sshd@5-147.75.202.177:22-139.178.68.195:53060.service: Deactivated successfully. Dec 13 03:41:12.120318 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 03:41:12.121985 systemd-logind[1593]: Session 8 logged out. Waiting for processes to exit. Dec 13 03:41:12.124713 systemd[1]: Started sshd@6-147.75.202.177:22-139.178.68.195:53070.service. Dec 13 03:41:12.127116 systemd-logind[1593]: Removed session 8. Dec 13 03:41:12.214182 sshd[1728]: Accepted publickey for core from 139.178.68.195 port 53070 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:12.215619 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:12.220161 systemd-logind[1593]: New session 9 of user core. Dec 13 03:41:12.221114 systemd[1]: Started session-9.scope. Dec 13 03:41:12.287102 sudo[1731]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 03:41:12.287239 sudo[1731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:41:12.301576 dbus-daemon[1517]: \xd0\xcd\xf8-\u0014V: received setenforce notice (enforcing=1006379504) Dec 13 03:41:12.302941 sudo[1731]: pam_unix(sudo:session): session closed for user root Dec 13 03:41:12.304610 sshd[1728]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:12.306872 systemd[1]: sshd@6-147.75.202.177:22-139.178.68.195:53070.service: Deactivated successfully. Dec 13 03:41:12.307320 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 03:41:12.307868 systemd-logind[1593]: Session 9 logged out. Waiting for processes to exit. Dec 13 03:41:12.308613 systemd[1]: Started sshd@7-147.75.202.177:22-139.178.68.195:53074.service. Dec 13 03:41:12.309170 systemd-logind[1593]: Removed session 9. Dec 13 03:41:12.388487 sshd[1735]: Accepted publickey for core from 139.178.68.195 port 53074 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:12.391085 sshd[1735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:12.398988 systemd-logind[1593]: New session 10 of user core. Dec 13 03:41:12.400682 systemd[1]: Started session-10.scope. Dec 13 03:41:12.470139 sudo[1739]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 03:41:12.470263 sudo[1739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:41:12.472043 sudo[1739]: pam_unix(sudo:session): session closed for user root Dec 13 03:41:12.474445 sudo[1738]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 03:41:12.474568 sudo[1738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:41:12.479874 systemd[1]: Stopping audit-rules.service... Dec 13 03:41:12.480000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:41:12.480810 auditctl[1742]: No rules Dec 13 03:41:12.480982 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 03:41:12.481069 systemd[1]: Stopped audit-rules.service. Dec 13 03:41:12.481918 systemd[1]: Starting audit-rules.service... Dec 13 03:41:12.486168 kernel: kauditd_printk_skb: 132 callbacks suppressed Dec 13 03:41:12.486193 kernel: audit: type=1305 audit(1734061272.480:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:41:12.491382 augenrules[1759]: No rules Dec 13 03:41:12.491696 systemd[1]: Finished audit-rules.service. Dec 13 03:41:12.492121 sudo[1738]: pam_unix(sudo:session): session closed for user root Dec 13 03:41:12.492835 sshd[1735]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:12.494676 systemd[1]: sshd@7-147.75.202.177:22-139.178.68.195:53074.service: Deactivated successfully. Dec 13 03:41:12.495032 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 03:41:12.495431 systemd-logind[1593]: Session 10 logged out. Waiting for processes to exit. Dec 13 03:41:12.495958 systemd[1]: Started sshd@8-147.75.202.177:22-139.178.68.195:53084.service. Dec 13 03:41:12.496465 systemd-logind[1593]: Removed session 10. Dec 13 03:41:12.480000 audit[1742]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6c834050 a2=420 a3=0 items=0 ppid=1 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.532525 kernel: audit: type=1300 audit(1734061272.480:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6c834050 a2=420 a3=0 items=0 ppid=1 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.532595 kernel: audit: type=1327 audit(1734061272.480:184): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:41:12.480000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:41:12.541983 kernel: audit: type=1131 audit(1734061272.480:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.557993 sshd[1765]: Accepted publickey for core from 139.178.68.195 port 53084 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:41:12.559673 sshd[1765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:12.561943 systemd-logind[1593]: New session 11 of user core. Dec 13 03:41:12.562312 systemd[1]: Started session-11.scope. Dec 13 03:41:12.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.586701 kernel: audit: type=1130 audit(1734061272.491:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.586729 kernel: audit: type=1106 audit(1734061272.491:187): pid=1738 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.491000 audit[1738]: USER_END pid=1738 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.609030 sudo[1768]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 03:41:12.609149 sudo[1768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:41:12.612607 kernel: audit: type=1104 audit(1734061272.491:188): pid=1738 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.491000 audit[1738]: CRED_DISP pid=1738 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.621314 systemd[1]: Starting docker.service... Dec 13 03:41:12.493000 audit[1735]: USER_END pid=1735 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.638277 env[1783]: time="2024-12-13T03:41:12.638255776Z" level=info msg="Starting up" Dec 13 03:41:12.638934 env[1783]: time="2024-12-13T03:41:12.638903156Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 03:41:12.638934 env[1783]: time="2024-12-13T03:41:12.638913546Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 03:41:12.638934 env[1783]: time="2024-12-13T03:41:12.638925970Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 03:41:12.638934 env[1783]: time="2024-12-13T03:41:12.638931818Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 03:41:12.639904 env[1783]: time="2024-12-13T03:41:12.639856688Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 03:41:12.639904 env[1783]: time="2024-12-13T03:41:12.639882822Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 03:41:12.639904 env[1783]: time="2024-12-13T03:41:12.639899759Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 03:41:12.639973 env[1783]: time="2024-12-13T03:41:12.639909081Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 03:41:12.668239 kernel: audit: type=1106 audit(1734061272.493:189): pid=1735 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.668268 kernel: audit: type=1104 audit(1734061272.493:190): pid=1735 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.493000 audit[1735]: CRED_DISP pid=1735 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.694158 kernel: audit: type=1131 audit(1734061272.494:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.202.177:22-139.178.68.195:53074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.202.177:22-139.178.68.195:53074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.703456 env[1783]: time="2024-12-13T03:41:12.703435488Z" level=info msg="Loading containers: start." Dec 13 03:41:12.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.177:22-139.178.68.195:53084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.556000 audit[1765]: USER_ACCT pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.558000 audit[1765]: CRED_ACQ pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.558000 audit[1765]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5af17cf0 a2=3 a3=0 items=0 ppid=1 pid=1765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.558000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:12.563000 audit[1765]: USER_START pid=1765 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.563000 audit[1767]: CRED_ACQ pid=1767 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:12.608000 audit[1768]: USER_ACCT pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.608000 audit[1768]: CRED_REFR pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.609000 audit[1768]: USER_START pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.748000 audit[1826]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.748000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff717a5860 a2=0 a3=7fff717a584c items=0 ppid=1783 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 03:41:12.749000 audit[1828]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.749000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff61f44ca0 a2=0 a3=7fff61f44c8c items=0 ppid=1783 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 03:41:12.750000 audit[1830]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.750000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff8857ea10 a2=0 a3=7fff8857e9fc items=0 ppid=1783 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 03:41:12.751000 audit[1832]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.751000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffd62bece0 a2=0 a3=7fffd62beccc items=0 ppid=1783 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 03:41:12.752000 audit[1834]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.752000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe64eb0290 a2=0 a3=7ffe64eb027c items=0 ppid=1783 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 03:41:12.784000 audit[1839]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.784000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2fa9ddf0 a2=0 a3=7ffe2fa9dddc items=0 ppid=1783 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 03:41:12.788000 audit[1841]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.788000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff54bca160 a2=0 a3=7fff54bca14c items=0 ppid=1783 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 03:41:12.789000 audit[1843]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.789000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeb2fc32d0 a2=0 a3=7ffeb2fc32bc items=0 ppid=1783 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 03:41:12.790000 audit[1845]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.790000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffb5951a30 a2=0 a3=7fffb5951a1c items=0 ppid=1783 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:41:12.793000 audit[1849]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.793000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcea162ec0 a2=0 a3=7ffcea162eac items=0 ppid=1783 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:41:12.805000 audit[1850]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.805000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc8b2d0ac0 a2=0 a3=7ffc8b2d0aac items=0 ppid=1783 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:41:12.825416 kernel: Initializing XFRM netlink socket Dec 13 03:41:12.848392 env[1783]: time="2024-12-13T03:41:12.848332607Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 03:41:12.859000 audit[1858]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.859000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff9505f850 a2=0 a3=7fff9505f83c items=0 ppid=1783 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 03:41:12.870000 audit[1861]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.870000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe864f33f0 a2=0 a3=7ffe864f33dc items=0 ppid=1783 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 03:41:12.872000 audit[1864]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.872000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffccc2297a0 a2=0 a3=7ffccc22978c items=0 ppid=1783 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 03:41:12.873000 audit[1866]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.873000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd52c171a0 a2=0 a3=7ffd52c1718c items=0 ppid=1783 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 03:41:12.875000 audit[1868]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.875000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff562f6cf0 a2=0 a3=7fff562f6cdc items=0 ppid=1783 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 03:41:12.876000 audit[1870]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.876000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc532a4700 a2=0 a3=7ffc532a46ec items=0 ppid=1783 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 03:41:12.877000 audit[1872]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.877000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc1589ff60 a2=0 a3=7ffc1589ff4c items=0 ppid=1783 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.877000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 03:41:12.884000 audit[1875]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.884000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff9b85c380 a2=0 a3=7fff9b85c36c items=0 ppid=1783 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 03:41:12.885000 audit[1877]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.885000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffc11519a0 a2=0 a3=7fffc115198c items=0 ppid=1783 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 03:41:12.887000 audit[1879]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.887000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd06ee8f90 a2=0 a3=7ffd06ee8f7c items=0 ppid=1783 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 03:41:12.888000 audit[1881]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.888000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd86a262a0 a2=0 a3=7ffd86a2628c items=0 ppid=1783 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 03:41:12.890318 systemd-networkd[1297]: docker0: Link UP Dec 13 03:41:12.893000 audit[1885]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.893000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc45d9ebb0 a2=0 a3=7ffc45d9eb9c items=0 ppid=1783 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:41:12.904000 audit[1886]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:12.904000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff58eef670 a2=0 a3=7fff58eef65c items=0 ppid=1783 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:12.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:41:12.906496 env[1783]: time="2024-12-13T03:41:12.906442065Z" level=info msg="Loading containers: done." Dec 13 03:41:12.915563 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck66913679-merged.mount: Deactivated successfully. Dec 13 03:41:12.916901 env[1783]: time="2024-12-13T03:41:12.916873355Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 03:41:12.917062 env[1783]: time="2024-12-13T03:41:12.917044129Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 03:41:12.917168 env[1783]: time="2024-12-13T03:41:12.917153459Z" level=info msg="Daemon has completed initialization" Dec 13 03:41:12.930946 systemd[1]: Started docker.service. Dec 13 03:41:12.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:12.941281 env[1783]: time="2024-12-13T03:41:12.941227746Z" level=info msg="API listen on /run/docker.sock" Dec 13 03:41:14.208653 env[1555]: time="2024-12-13T03:41:14.208584530Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 03:41:14.829438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount215137944.mount: Deactivated successfully. Dec 13 03:41:16.148220 env[1555]: time="2024-12-13T03:41:16.148173578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:16.148780 env[1555]: time="2024-12-13T03:41:16.148731371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:16.149753 env[1555]: time="2024-12-13T03:41:16.149710750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:16.150932 env[1555]: time="2024-12-13T03:41:16.150898250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:16.151251 env[1555]: time="2024-12-13T03:41:16.151215329Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 03:41:16.156691 env[1555]: time="2024-12-13T03:41:16.156676943Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 03:41:17.194058 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 03:41:17.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:17.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:17.194190 systemd[1]: Stopped kubelet.service. Dec 13 03:41:17.195025 systemd[1]: Starting kubelet.service... Dec 13 03:41:17.355374 systemd[1]: Started kubelet.service. Dec 13 03:41:17.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:17.402151 kubelet[1956]: E1213 03:41:17.402069 1956 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:41:17.403275 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:41:17.403369 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:41:17.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:41:17.825142 env[1555]: time="2024-12-13T03:41:17.825087229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:17.825669 env[1555]: time="2024-12-13T03:41:17.825635988Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:17.826716 env[1555]: time="2024-12-13T03:41:17.826670000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:17.827909 env[1555]: time="2024-12-13T03:41:17.827864588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:17.828216 env[1555]: time="2024-12-13T03:41:17.828163574Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 03:41:17.834213 env[1555]: time="2024-12-13T03:41:17.834192998Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 03:41:19.003455 env[1555]: time="2024-12-13T03:41:19.003403206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:19.004086 env[1555]: time="2024-12-13T03:41:19.004072206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:19.005459 env[1555]: time="2024-12-13T03:41:19.005384689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:19.006318 env[1555]: time="2024-12-13T03:41:19.006305094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:19.006929 env[1555]: time="2024-12-13T03:41:19.006879100Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 03:41:19.014288 env[1555]: time="2024-12-13T03:41:19.014270603Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 03:41:20.014716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3657978086.mount: Deactivated successfully. Dec 13 03:41:20.358406 env[1555]: time="2024-12-13T03:41:20.358283859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:20.358932 env[1555]: time="2024-12-13T03:41:20.358897045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:20.359660 env[1555]: time="2024-12-13T03:41:20.359612030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:20.360330 env[1555]: time="2024-12-13T03:41:20.360317674Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:20.360739 env[1555]: time="2024-12-13T03:41:20.360696857Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 03:41:20.366628 env[1555]: time="2024-12-13T03:41:20.366611766Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 03:41:21.092748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3919686694.mount: Deactivated successfully. Dec 13 03:41:21.956941 env[1555]: time="2024-12-13T03:41:21.956912987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:21.958047 env[1555]: time="2024-12-13T03:41:21.958029330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:21.959506 env[1555]: time="2024-12-13T03:41:21.959492980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:21.960590 env[1555]: time="2024-12-13T03:41:21.960527215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:21.961253 env[1555]: time="2024-12-13T03:41:21.961209872Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 03:41:21.968387 env[1555]: time="2024-12-13T03:41:21.968347401Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 03:41:22.489548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2578557876.mount: Deactivated successfully. Dec 13 03:41:22.490555 env[1555]: time="2024-12-13T03:41:22.490509263Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:22.491114 env[1555]: time="2024-12-13T03:41:22.491080228Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:22.491870 env[1555]: time="2024-12-13T03:41:22.491828978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:22.492543 env[1555]: time="2024-12-13T03:41:22.492510892Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:22.492889 env[1555]: time="2024-12-13T03:41:22.492837800Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 03:41:22.498036 env[1555]: time="2024-12-13T03:41:22.497993084Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 03:41:23.041907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2969204730.mount: Deactivated successfully. Dec 13 03:41:25.028084 env[1555]: time="2024-12-13T03:41:25.028023001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:25.028669 env[1555]: time="2024-12-13T03:41:25.028614872Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:25.029840 env[1555]: time="2024-12-13T03:41:25.029804000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:25.031156 env[1555]: time="2024-12-13T03:41:25.031132070Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:25.031955 env[1555]: time="2024-12-13T03:41:25.031915596Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 03:41:27.283161 systemd[1]: Stopped kubelet.service. Dec 13 03:41:27.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.284550 systemd[1]: Starting kubelet.service... Dec 13 03:41:27.288734 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 03:41:27.288776 kernel: audit: type=1130 audit(1734061287.281:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.293681 systemd[1]: Reloading. Dec 13 03:41:27.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.329956 /usr/lib/systemd/system-generators/torcx-generator[2161]: time="2024-12-13T03:41:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:41:27.329978 /usr/lib/systemd/system-generators/torcx-generator[2161]: time="2024-12-13T03:41:27Z" level=info msg="torcx already run" Dec 13 03:41:27.366196 kernel: audit: type=1131 audit(1734061287.281:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.386144 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:41:27.386151 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:41:27.397235 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.554398 kernel: audit: type=1400 audit(1734061287.442:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.554493 kernel: audit: type=1400 audit(1734061287.442:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.554538 kernel: audit: type=1400 audit(1734061287.442:234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.611655 kernel: audit: type=1400 audit(1734061287.442:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.670998 kernel: audit: type=1400 audit(1734061287.442:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.731005 kernel: audit: type=1400 audit(1734061287.442:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.792285 kernel: audit: type=1400 audit(1734061287.442:238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.854518 kernel: audit: type=1400 audit(1734061287.442:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit: BPF prog-id=40 op=LOAD Dec 13 03:41:27.610000 audit: BPF prog-id=24 op=UNLOAD Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit: BPF prog-id=41 op=LOAD Dec 13 03:41:27.729000 audit: BPF prog-id=25 op=UNLOAD Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit: BPF prog-id=42 op=LOAD Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.918000 audit: BPF prog-id=43 op=LOAD Dec 13 03:41:27.918000 audit: BPF prog-id=26 op=UNLOAD Dec 13 03:41:27.918000 audit: BPF prog-id=27 op=UNLOAD Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit: BPF prog-id=44 op=LOAD Dec 13 03:41:27.919000 audit: BPF prog-id=36 op=UNLOAD Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit: BPF prog-id=45 op=LOAD Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.919000 audit: BPF prog-id=46 op=LOAD Dec 13 03:41:27.920000 audit: BPF prog-id=37 op=UNLOAD Dec 13 03:41:27.920000 audit: BPF prog-id=38 op=UNLOAD Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit: BPF prog-id=47 op=LOAD Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit: BPF prog-id=48 op=LOAD Dec 13 03:41:27.920000 audit: BPF prog-id=28 op=UNLOAD Dec 13 03:41:27.920000 audit: BPF prog-id=29 op=UNLOAD Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.920000 audit: BPF prog-id=49 op=LOAD Dec 13 03:41:27.920000 audit: BPF prog-id=35 op=UNLOAD Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit: BPF prog-id=50 op=LOAD Dec 13 03:41:27.922000 audit: BPF prog-id=30 op=UNLOAD Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit: BPF prog-id=51 op=LOAD Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit: BPF prog-id=52 op=LOAD Dec 13 03:41:27.922000 audit: BPF prog-id=31 op=UNLOAD Dec 13 03:41:27.922000 audit: BPF prog-id=32 op=UNLOAD Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.922000 audit: BPF prog-id=53 op=LOAD Dec 13 03:41:27.922000 audit: BPF prog-id=34 op=UNLOAD Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:27.923000 audit: BPF prog-id=54 op=LOAD Dec 13 03:41:27.923000 audit: BPF prog-id=33 op=UNLOAD Dec 13 03:41:27.930448 systemd[1]: Started kubelet.service. Dec 13 03:41:27.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.931220 systemd[1]: Stopping kubelet.service... Dec 13 03:41:27.931398 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 03:41:27.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:27.931495 systemd[1]: Stopped kubelet.service. Dec 13 03:41:27.932186 systemd[1]: Starting kubelet.service... Dec 13 03:41:28.132669 systemd[1]: Started kubelet.service. Dec 13 03:41:28.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:28.160012 kubelet[2227]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:41:28.160012 kubelet[2227]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:41:28.160012 kubelet[2227]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:41:28.160251 kubelet[2227]: I1213 03:41:28.160051 2227 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:41:28.511541 kubelet[2227]: I1213 03:41:28.511497 2227 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:41:28.511541 kubelet[2227]: I1213 03:41:28.511508 2227 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:41:28.511681 kubelet[2227]: I1213 03:41:28.511641 2227 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:41:28.527909 kubelet[2227]: E1213 03:41:28.527877 2227 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.202.177:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.531156 kubelet[2227]: I1213 03:41:28.531127 2227 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:41:28.557371 kubelet[2227]: I1213 03:41:28.557350 2227 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:41:28.558473 kubelet[2227]: I1213 03:41:28.558437 2227 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:41:28.558578 kubelet[2227]: I1213 03:41:28.558542 2227 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:41:28.558953 kubelet[2227]: I1213 03:41:28.558918 2227 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:41:28.558953 kubelet[2227]: I1213 03:41:28.558927 2227 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:41:28.559007 kubelet[2227]: I1213 03:41:28.558991 2227 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:41:28.559072 kubelet[2227]: I1213 03:41:28.559044 2227 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:41:28.559072 kubelet[2227]: I1213 03:41:28.559053 2227 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:41:28.559072 kubelet[2227]: I1213 03:41:28.559068 2227 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:41:28.559167 kubelet[2227]: I1213 03:41:28.559076 2227 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:41:28.559413 kubelet[2227]: W1213 03:41:28.559388 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.75.202.177:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.559456 kubelet[2227]: E1213 03:41:28.559429 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.202.177:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.559456 kubelet[2227]: W1213 03:41:28.559422 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.75.202.177:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-cc0c4ef4b9&limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.559456 kubelet[2227]: E1213 03:41:28.559450 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.202.177:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-cc0c4ef4b9&limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.560148 kubelet[2227]: I1213 03:41:28.560100 2227 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:41:28.563949 kubelet[2227]: I1213 03:41:28.563912 2227 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:41:28.563949 kubelet[2227]: W1213 03:41:28.563943 2227 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 03:41:28.564247 kubelet[2227]: I1213 03:41:28.564222 2227 server.go:1256] "Started kubelet" Dec 13 03:41:28.564302 kubelet[2227]: I1213 03:41:28.564281 2227 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:41:28.564346 kubelet[2227]: I1213 03:41:28.564311 2227 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:41:28.564545 kubelet[2227]: I1213 03:41:28.564498 2227 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:41:28.563000 audit[2227]: AVC avc: denied { mac_admin } for pid=2227 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:28.563000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:28.563000 audit[2227]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b88cf0 a1=c000b8e780 a2=c000b88cc0 a3=25 items=0 ppid=1 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.563000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:28.571362 kubelet[2227]: I1213 03:41:28.571208 2227 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:41:28.570000 audit[2227]: AVC avc: denied { mac_admin } for pid=2227 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:28.570000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:28.570000 audit[2227]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005a4da0 a1=c00007cae0 a2=c000f3c0c0 a3=25 items=0 ppid=1 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:28.571625 kubelet[2227]: I1213 03:41:28.571395 2227 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:41:28.571625 kubelet[2227]: I1213 03:41:28.571457 2227 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:41:28.571625 kubelet[2227]: I1213 03:41:28.571570 2227 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:41:28.571766 kubelet[2227]: I1213 03:41:28.571751 2227 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:41:28.571821 kubelet[2227]: E1213 03:41:28.571795 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:28.572363 kubelet[2227]: I1213 03:41:28.572347 2227 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:41:28.572477 kubelet[2227]: W1213 03:41:28.572365 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.75.202.177:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.572477 kubelet[2227]: E1213 03:41:28.572460 2227 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.202.177:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-cc0c4ef4b9?timeout=10s\": dial tcp 147.75.202.177:6443: connect: connection refused" interval="200ms" Dec 13 03:41:28.572587 kubelet[2227]: E1213 03:41:28.572526 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.202.177:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.572689 kubelet[2227]: I1213 03:41:28.572641 2227 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:41:28.572749 kubelet[2227]: I1213 03:41:28.572714 2227 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:41:28.573073 kubelet[2227]: I1213 03:41:28.572827 2227 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:41:28.573145 kubelet[2227]: E1213 03:41:28.573135 2227 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:41:28.573625 kubelet[2227]: I1213 03:41:28.573613 2227 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:41:28.572000 audit[2251]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.572000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc83e86750 a2=0 a3=7ffc83e8673c items=0 ppid=2227 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:41:28.573000 audit[2252]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.573000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe754712f0 a2=0 a3=7ffe754712dc items=0 ppid=2227 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:41:28.574747 kubelet[2227]: E1213 03:41:28.574615 2227 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.202.177:6443/api/v1/namespaces/default/events\": dial tcp 147.75.202.177:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-cc0c4ef4b9.18109f8df3a036bb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-cc0c4ef4b9,UID:ci-3510.3.6-a-cc0c4ef4b9,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-cc0c4ef4b9,},FirstTimestamp:2024-12-13 03:41:28.564209339 +0000 UTC m=+0.428451573,LastTimestamp:2024-12-13 03:41:28.564209339 +0000 UTC m=+0.428451573,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-cc0c4ef4b9,}" Dec 13 03:41:28.574000 audit[2254]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.574000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc90f8f80 a2=0 a3=7ffcc90f8f6c items=0 ppid=2227 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:41:28.576000 audit[2256]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.576000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc66a2ca50 a2=0 a3=7ffc66a2ca3c items=0 ppid=2227 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:41:28.580000 audit[2259]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.580000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe07000980 a2=0 a3=7ffe0700096c items=0 ppid=2227 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 03:41:28.582225 kubelet[2227]: I1213 03:41:28.582145 2227 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:41:28.581000 audit[2260]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:28.581000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4a7df9a0 a2=0 a3=7ffc4a7df98c items=0 ppid=2227 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:41:28.581000 audit[2261]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.581000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd92160c0 a2=0 a3=7ffcd92160ac items=0 ppid=2227 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:41:28.582782 kubelet[2227]: I1213 03:41:28.582674 2227 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:41:28.582782 kubelet[2227]: I1213 03:41:28.582692 2227 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:41:28.582782 kubelet[2227]: I1213 03:41:28.582707 2227 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:41:28.582782 kubelet[2227]: E1213 03:41:28.582736 2227 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 03:41:28.582930 kubelet[2227]: W1213 03:41:28.582894 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://147.75.202.177:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.582930 kubelet[2227]: E1213 03:41:28.582916 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.202.177:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:28.581000 audit[2263]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.581000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4330d4e0 a2=0 a3=7ffd4330d4cc items=0 ppid=2227 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:41:28.581000 audit[2264]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:28.581000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebb859e50 a2=0 a3=7ffebb859e3c items=0 ppid=2227 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:41:28.582000 audit[2265]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:28.582000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8fbcf8f0 a2=0 a3=7ffe8fbcf8dc items=0 ppid=2227 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:41:28.582000 audit[2266]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:28.582000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff114c39a0 a2=0 a3=10e3 items=0 ppid=2227 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:41:28.582000 audit[2267]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:28.582000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd17517df0 a2=0 a3=7ffd17517ddc items=0 ppid=2227 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:41:28.644255 kubelet[2227]: I1213 03:41:28.644190 2227 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:41:28.644255 kubelet[2227]: I1213 03:41:28.644252 2227 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:41:28.644766 kubelet[2227]: I1213 03:41:28.644310 2227 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:41:28.646350 kubelet[2227]: I1213 03:41:28.646299 2227 policy_none.go:49] "None policy: Start" Dec 13 03:41:28.647515 kubelet[2227]: I1213 03:41:28.647441 2227 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:41:28.647515 kubelet[2227]: I1213 03:41:28.647496 2227 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:41:28.662518 systemd[1]: Created slice kubepods.slice. Dec 13 03:41:28.673489 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 03:41:28.675935 kubelet[2227]: I1213 03:41:28.675859 2227 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.676719 kubelet[2227]: E1213 03:41:28.676637 2227 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.202.177:6443/api/v1/nodes\": dial tcp 147.75.202.177:6443: connect: connection refused" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.680918 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 03:41:28.682866 kubelet[2227]: E1213 03:41:28.682791 2227 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 03:41:28.701155 kubelet[2227]: I1213 03:41:28.701077 2227 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:41:28.699000 audit[2227]: AVC avc: denied { mac_admin } for pid=2227 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:28.699000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:28.699000 audit[2227]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014cf140 a1=c000b8f578 a2=c0014cf110 a3=25 items=0 ppid=1 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:28.699000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:28.702294 kubelet[2227]: I1213 03:41:28.701212 2227 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:41:28.702294 kubelet[2227]: I1213 03:41:28.701674 2227 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:41:28.703705 kubelet[2227]: E1213 03:41:28.703659 2227 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:28.774290 kubelet[2227]: E1213 03:41:28.774095 2227 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.202.177:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-cc0c4ef4b9?timeout=10s\": dial tcp 147.75.202.177:6443: connect: connection refused" interval="400ms" Dec 13 03:41:28.880635 kubelet[2227]: I1213 03:41:28.880581 2227 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.881289 kubelet[2227]: E1213 03:41:28.881249 2227 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.202.177:6443/api/v1/nodes\": dial tcp 147.75.202.177:6443: connect: connection refused" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.883424 kubelet[2227]: I1213 03:41:28.883383 2227 topology_manager.go:215] "Topology Admit Handler" podUID="d12ea615d58efd5dcd016dbd60de47da" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.886900 kubelet[2227]: I1213 03:41:28.886828 2227 topology_manager.go:215] "Topology Admit Handler" podUID="b78351c762717855df82a0e63fff3c6a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.892369 kubelet[2227]: I1213 03:41:28.892305 2227 topology_manager.go:215] "Topology Admit Handler" podUID="f9414a343ec6ef13b2f7050c778c9a71" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.904587 systemd[1]: Created slice kubepods-burstable-podd12ea615d58efd5dcd016dbd60de47da.slice. Dec 13 03:41:28.926536 systemd[1]: Created slice kubepods-burstable-podb78351c762717855df82a0e63fff3c6a.slice. Dec 13 03:41:28.934747 systemd[1]: Created slice kubepods-burstable-podf9414a343ec6ef13b2f7050c778c9a71.slice. Dec 13 03:41:28.974302 kubelet[2227]: I1213 03:41:28.974198 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974603 kubelet[2227]: I1213 03:41:28.974369 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974603 kubelet[2227]: I1213 03:41:28.974498 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974603 kubelet[2227]: I1213 03:41:28.974564 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974939 kubelet[2227]: I1213 03:41:28.974745 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974939 kubelet[2227]: I1213 03:41:28.974837 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.974939 kubelet[2227]: I1213 03:41:28.974897 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.975243 kubelet[2227]: I1213 03:41:28.974983 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:28.975243 kubelet[2227]: I1213 03:41:28.975097 2227 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f9414a343ec6ef13b2f7050c778c9a71-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"f9414a343ec6ef13b2f7050c778c9a71\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:29.176097 kubelet[2227]: E1213 03:41:29.175892 2227 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.202.177:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-cc0c4ef4b9?timeout=10s\": dial tcp 147.75.202.177:6443: connect: connection refused" interval="800ms" Dec 13 03:41:29.222022 env[1555]: time="2024-12-13T03:41:29.221828268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9,Uid:d12ea615d58efd5dcd016dbd60de47da,Namespace:kube-system,Attempt:0,}" Dec 13 03:41:29.233055 env[1555]: time="2024-12-13T03:41:29.232942979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9,Uid:b78351c762717855df82a0e63fff3c6a,Namespace:kube-system,Attempt:0,}" Dec 13 03:41:29.240220 env[1555]: time="2024-12-13T03:41:29.240120095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9,Uid:f9414a343ec6ef13b2f7050c778c9a71,Namespace:kube-system,Attempt:0,}" Dec 13 03:41:29.285671 kubelet[2227]: I1213 03:41:29.285581 2227 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:29.286357 kubelet[2227]: E1213 03:41:29.286266 2227 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.202.177:6443/api/v1/nodes\": dial tcp 147.75.202.177:6443: connect: connection refused" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:29.558747 kubelet[2227]: W1213 03:41:29.558588 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.75.202.177:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.558747 kubelet[2227]: E1213 03:41:29.558725 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.202.177:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.823705 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1832910537.mount: Deactivated successfully. Dec 13 03:41:29.825167 env[1555]: time="2024-12-13T03:41:29.825146599Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.826267 env[1555]: time="2024-12-13T03:41:29.826243761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.826998 env[1555]: time="2024-12-13T03:41:29.826986381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.827726 env[1555]: time="2024-12-13T03:41:29.827716416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.828504 env[1555]: time="2024-12-13T03:41:29.828492838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.829840 env[1555]: time="2024-12-13T03:41:29.829828951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.831621 env[1555]: time="2024-12-13T03:41:29.831579321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.832391 env[1555]: time="2024-12-13T03:41:29.832381453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.832851 env[1555]: time="2024-12-13T03:41:29.832840734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.833673 env[1555]: time="2024-12-13T03:41:29.833662280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.834151 env[1555]: time="2024-12-13T03:41:29.834141478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.834586 env[1555]: time="2024-12-13T03:41:29.834576227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839527690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839553815Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839542853Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839559350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839561603Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:29.839566 env[1555]: time="2024-12-13T03:41:29.839566078Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:29.839795 env[1555]: time="2024-12-13T03:41:29.839631788Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef62520fa4c70d3bbb7a34c0b140e96854cdca3b0e583c8ec33027e856788502 pid=2283 runtime=io.containerd.runc.v2 Dec 13 03:41:29.839795 env[1555]: time="2024-12-13T03:41:29.839642092Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b700fe10591fef8e3bf50b79927f89ec2165e7a38113ca2c965176760efd4948 pid=2285 runtime=io.containerd.runc.v2 Dec 13 03:41:29.840829 env[1555]: time="2024-12-13T03:41:29.840800378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:29.840829 env[1555]: time="2024-12-13T03:41:29.840817600Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:29.840829 env[1555]: time="2024-12-13T03:41:29.840824284Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:29.840908 env[1555]: time="2024-12-13T03:41:29.840886707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b93ba84ead2a44bd991518563f7a9f753e007d9500e282608c54ecb6b2f962c pid=2309 runtime=io.containerd.runc.v2 Dec 13 03:41:29.848857 systemd[1]: Started cri-containerd-9b93ba84ead2a44bd991518563f7a9f753e007d9500e282608c54ecb6b2f962c.scope. Dec 13 03:41:29.849739 systemd[1]: Started cri-containerd-b700fe10591fef8e3bf50b79927f89ec2165e7a38113ca2c965176760efd4948.scope. Dec 13 03:41:29.850504 systemd[1]: Started cri-containerd-ef62520fa4c70d3bbb7a34c0b140e96854cdca3b0e583c8ec33027e856788502.scope. Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit: BPF prog-id=55 op=LOAD Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2309 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393362613834656164326134346264393931353138353633663761 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2309 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393362613834656164326134346264393931353138353633663761 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.852000 audit: BPF prog-id=56 op=LOAD Dec 13 03:41:29.852000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f2bb0 items=0 ppid=2309 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393362613834656164326134346264393931353138353633663761 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=57 op=LOAD Dec 13 03:41:29.853000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f2bf8 items=0 ppid=2309 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393362613834656164326134346264393931353138353633663761 Dec 13 03:41:29.853000 audit: BPF prog-id=57 op=UNLOAD Dec 13 03:41:29.853000 audit: BPF prog-id=56 op=UNLOAD Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=58 op=LOAD Dec 13 03:41:29.853000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f3008 items=0 ppid=2309 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393362613834656164326134346264393931353138353633663761 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=59 op=LOAD Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2285 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303066653130353931666566386533626635306237393932376638 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2285 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303066653130353931666566386533626635306237393932376638 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=60 op=LOAD Dec 13 03:41:29.853000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000aaeb0 items=0 ppid=2285 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303066653130353931666566386533626635306237393932376638 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=61 op=LOAD Dec 13 03:41:29.853000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000aaef8 items=0 ppid=2285 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303066653130353931666566386533626635306237393932376638 Dec 13 03:41:29.853000 audit: BPF prog-id=61 op=UNLOAD Dec 13 03:41:29.853000 audit: BPF prog-id=60 op=UNLOAD Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.853000 audit: BPF prog-id=62 op=LOAD Dec 13 03:41:29.853000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000ab308 items=0 ppid=2285 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303066653130353931666566386533626635306237393932376638 Dec 13 03:41:29.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit: BPF prog-id=63 op=LOAD Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363235323066613463373064336262623761333463306231343065 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363235323066613463373064336262623761333463306231343065 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit: BPF prog-id=64 op=LOAD Dec 13 03:41:29.854000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00021eeb0 items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363235323066613463373064336262623761333463306231343065 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit: BPF prog-id=65 op=LOAD Dec 13 03:41:29.854000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00021eef8 items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363235323066613463373064336262623761333463306231343065 Dec 13 03:41:29.854000 audit: BPF prog-id=65 op=UNLOAD Dec 13 03:41:29.854000 audit: BPF prog-id=64 op=UNLOAD Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.854000 audit: BPF prog-id=66 op=LOAD Dec 13 03:41:29.854000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00021f308 items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363235323066613463373064336262623761333463306231343065 Dec 13 03:41:29.870640 env[1555]: time="2024-12-13T03:41:29.870584715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9,Uid:b78351c762717855df82a0e63fff3c6a,Namespace:kube-system,Attempt:0,} returns sandbox id \"9b93ba84ead2a44bd991518563f7a9f753e007d9500e282608c54ecb6b2f962c\"" Dec 13 03:41:29.871545 env[1555]: time="2024-12-13T03:41:29.871530146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9,Uid:d12ea615d58efd5dcd016dbd60de47da,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef62520fa4c70d3bbb7a34c0b140e96854cdca3b0e583c8ec33027e856788502\"" Dec 13 03:41:29.871835 env[1555]: time="2024-12-13T03:41:29.871823802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9,Uid:f9414a343ec6ef13b2f7050c778c9a71,Namespace:kube-system,Attempt:0,} returns sandbox id \"b700fe10591fef8e3bf50b79927f89ec2165e7a38113ca2c965176760efd4948\"" Dec 13 03:41:29.873248 env[1555]: time="2024-12-13T03:41:29.873236705Z" level=info msg="CreateContainer within sandbox \"b700fe10591fef8e3bf50b79927f89ec2165e7a38113ca2c965176760efd4948\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 03:41:29.873288 env[1555]: time="2024-12-13T03:41:29.873240049Z" level=info msg="CreateContainer within sandbox \"9b93ba84ead2a44bd991518563f7a9f753e007d9500e282608c54ecb6b2f962c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 03:41:29.873288 env[1555]: time="2024-12-13T03:41:29.873265613Z" level=info msg="CreateContainer within sandbox \"ef62520fa4c70d3bbb7a34c0b140e96854cdca3b0e583c8ec33027e856788502\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 03:41:29.874566 kubelet[2227]: W1213 03:41:29.874537 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.75.202.177:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-cc0c4ef4b9&limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.874620 kubelet[2227]: E1213 03:41:29.874572 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.202.177:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-cc0c4ef4b9&limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.881279 env[1555]: time="2024-12-13T03:41:29.881253162Z" level=info msg="CreateContainer within sandbox \"ef62520fa4c70d3bbb7a34c0b140e96854cdca3b0e583c8ec33027e856788502\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1de63123f411b0fe82909fed1d1f5eb7f8ed50e5a13495326e526cb10e691c88\"" Dec 13 03:41:29.881585 env[1555]: time="2024-12-13T03:41:29.881572419Z" level=info msg="StartContainer for \"1de63123f411b0fe82909fed1d1f5eb7f8ed50e5a13495326e526cb10e691c88\"" Dec 13 03:41:29.882204 env[1555]: time="2024-12-13T03:41:29.882187552Z" level=info msg="CreateContainer within sandbox \"9b93ba84ead2a44bd991518563f7a9f753e007d9500e282608c54ecb6b2f962c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6149a088902ef9fac77def2670d2553c3f59e999f2ee6f8c873899eab86cf234\"" Dec 13 03:41:29.882363 env[1555]: time="2024-12-13T03:41:29.882350562Z" level=info msg="StartContainer for \"6149a088902ef9fac77def2670d2553c3f59e999f2ee6f8c873899eab86cf234\"" Dec 13 03:41:29.882550 env[1555]: time="2024-12-13T03:41:29.882533419Z" level=info msg="CreateContainer within sandbox \"b700fe10591fef8e3bf50b79927f89ec2165e7a38113ca2c965176760efd4948\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"26ed4dad19b2d24e360899292aceac2b990939b08b1e5baa54d317c604a6fc86\"" Dec 13 03:41:29.882719 env[1555]: time="2024-12-13T03:41:29.882705995Z" level=info msg="StartContainer for \"26ed4dad19b2d24e360899292aceac2b990939b08b1e5baa54d317c604a6fc86\"" Dec 13 03:41:29.890195 kubelet[2227]: W1213 03:41:29.890149 2227 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.75.202.177:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.890195 kubelet[2227]: E1213 03:41:29.890199 2227 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.202.177:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.202.177:6443: connect: connection refused Dec 13 03:41:29.890486 systemd[1]: Started cri-containerd-1de63123f411b0fe82909fed1d1f5eb7f8ed50e5a13495326e526cb10e691c88.scope. Dec 13 03:41:29.891182 systemd[1]: Started cri-containerd-26ed4dad19b2d24e360899292aceac2b990939b08b1e5baa54d317c604a6fc86.scope. Dec 13 03:41:29.891816 systemd[1]: Started cri-containerd-6149a088902ef9fac77def2670d2553c3f59e999f2ee6f8c873899eab86cf234.scope. Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit: BPF prog-id=67 op=LOAD Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2283 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653633313233663431316230666538323930396665643164316635 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2283 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653633313233663431316230666538323930396665643164316635 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit: BPF prog-id=68 op=LOAD Dec 13 03:41:29.895000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002abc90 items=0 ppid=2283 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653633313233663431316230666538323930396665643164316635 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit: BPF prog-id=69 op=LOAD Dec 13 03:41:29.895000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002abcd8 items=0 ppid=2283 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653633313233663431316230666538323930396665643164316635 Dec 13 03:41:29.895000 audit: BPF prog-id=69 op=UNLOAD Dec 13 03:41:29.895000 audit: BPF prog-id=68 op=UNLOAD Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.895000 audit: BPF prog-id=70 op=LOAD Dec 13 03:41:29.895000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003900e8 items=0 ppid=2283 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653633313233663431316230666538323930396665643164316635 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit: BPF prog-id=71 op=LOAD Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2285 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656434646164313962326432346533363038393932393261636561 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2285 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656434646164313962326432346533363038393932393261636561 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit: BPF prog-id=72 op=LOAD Dec 13 03:41:29.896000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00032dd40 items=0 ppid=2285 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656434646164313962326432346533363038393932393261636561 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit: BPF prog-id=73 op=LOAD Dec 13 03:41:29.896000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00032dd88 items=0 ppid=2285 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656434646164313962326432346533363038393932393261636561 Dec 13 03:41:29.896000 audit: BPF prog-id=73 op=UNLOAD Dec 13 03:41:29.896000 audit: BPF prog-id=72 op=UNLOAD Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.896000 audit: BPF prog-id=74 op=LOAD Dec 13 03:41:29.896000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003b0198 items=0 ppid=2285 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656434646164313962326432346533363038393932393261636561 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit: BPF prog-id=75 op=LOAD Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343961303838393032656639666163373764656632363730643235 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343961303838393032656639666163373764656632363730643235 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit: BPF prog-id=76 op=LOAD Dec 13 03:41:29.897000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da020 items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343961303838393032656639666163373764656632363730643235 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit: BPF prog-id=77 op=LOAD Dec 13 03:41:29.897000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da068 items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343961303838393032656639666163373764656632363730643235 Dec 13 03:41:29.897000 audit: BPF prog-id=77 op=UNLOAD Dec 13 03:41:29.897000 audit: BPF prog-id=76 op=UNLOAD Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:29.897000 audit: BPF prog-id=78 op=LOAD Dec 13 03:41:29.897000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da478 items=0 ppid=2309 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343961303838393032656639666163373764656632363730643235 Dec 13 03:41:29.914009 env[1555]: time="2024-12-13T03:41:29.913962554Z" level=info msg="StartContainer for \"1de63123f411b0fe82909fed1d1f5eb7f8ed50e5a13495326e526cb10e691c88\" returns successfully" Dec 13 03:41:29.914125 env[1555]: time="2024-12-13T03:41:29.914090101Z" level=info msg="StartContainer for \"26ed4dad19b2d24e360899292aceac2b990939b08b1e5baa54d317c604a6fc86\" returns successfully" Dec 13 03:41:29.914818 env[1555]: time="2024-12-13T03:41:29.914802092Z" level=info msg="StartContainer for \"6149a088902ef9fac77def2670d2553c3f59e999f2ee6f8c873899eab86cf234\" returns successfully" Dec 13 03:41:30.088375 kubelet[2227]: I1213 03:41:30.088303 2227 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:30.262000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.262000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000622030 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:30.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:30.262000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.262000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00089c520 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:30.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:30.459000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.459000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00610a000 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.459000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.459000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004f42020 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.459000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.459000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004224090 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.459000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.459000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c004f420a0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.459000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.459000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c002c50060 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.460000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:30.460000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00610a240 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:41:30.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:41:30.470822 kubelet[2227]: E1213 03:41:30.470805 2227 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-cc0c4ef4b9\" not found" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:30.583261 kubelet[2227]: I1213 03:41:30.583243 2227 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:30.588285 kubelet[2227]: E1213 03:41:30.588268 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:30.689454 kubelet[2227]: E1213 03:41:30.689331 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:30.790728 kubelet[2227]: E1213 03:41:30.790480 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:30.891084 kubelet[2227]: E1213 03:41:30.890985 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:30.992389 kubelet[2227]: E1213 03:41:30.992237 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.093083 kubelet[2227]: E1213 03:41:31.092833 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.193556 kubelet[2227]: E1213 03:41:31.193455 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.293688 kubelet[2227]: E1213 03:41:31.293592 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.394955 kubelet[2227]: E1213 03:41:31.394761 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.495837 kubelet[2227]: E1213 03:41:31.495759 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.596070 kubelet[2227]: E1213 03:41:31.596014 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.697126 kubelet[2227]: E1213 03:41:31.697027 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.798265 kubelet[2227]: E1213 03:41:31.798171 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.898367 kubelet[2227]: E1213 03:41:31.898314 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:31.999141 kubelet[2227]: E1213 03:41:31.998914 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:32.099535 kubelet[2227]: E1213 03:41:32.099436 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:32.199813 kubelet[2227]: E1213 03:41:32.199722 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:32.300624 kubelet[2227]: E1213 03:41:32.300457 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:32.401378 kubelet[2227]: E1213 03:41:32.401287 2227 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:32.561792 kubelet[2227]: I1213 03:41:32.561555 2227 apiserver.go:52] "Watching apiserver" Dec 13 03:41:32.572761 kubelet[2227]: I1213 03:41:32.572671 2227 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:41:33.384109 kubelet[2227]: W1213 03:41:33.384000 2227 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:33.810331 systemd[1]: Reloading. Dec 13 03:41:33.896275 /usr/lib/systemd/system-generators/torcx-generator[2563]: time="2024-12-13T03:41:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:41:33.896319 /usr/lib/systemd/system-generators/torcx-generator[2563]: time="2024-12-13T03:41:33Z" level=info msg="torcx already run" Dec 13 03:41:33.993184 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:41:33.993195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:41:34.007476 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:41:34.061346 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 03:41:34.061396 kernel: audit: type=1400 audit(1734061294.060:538): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.214409 kernel: audit: type=1400 audit(1734061294.060:539): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.214436 kernel: audit: type=1400 audit(1734061294.060:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.277224 kernel: audit: type=1400 audit(1734061294.060:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340644 kernel: audit: type=1400 audit(1734061294.060:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.403957 kernel: audit: type=1400 audit(1734061294.060:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467198 kernel: audit: type=1400 audit(1734061294.060:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.530421 kernel: audit: type=1400 audit(1734061294.060:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593905 kernel: audit: type=1400 audit(1734061294.060:546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719678 kernel: audit: type=1400 audit(1734061294.151:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit: BPF prog-id=79 op=LOAD Dec 13 03:41:34.151000 audit: BPF prog-id=71 op=UNLOAD Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit: BPF prog-id=80 op=LOAD Dec 13 03:41:34.340000 audit: BPF prog-id=40 op=UNLOAD Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.466000 audit: BPF prog-id=81 op=LOAD Dec 13 03:41:34.466000 audit: BPF prog-id=67 op=UNLOAD Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit: BPF prog-id=82 op=LOAD Dec 13 03:41:34.593000 audit: BPF prog-id=41 op=UNLOAD Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit: BPF prog-id=83 op=LOAD Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.719000 audit: BPF prog-id=84 op=LOAD Dec 13 03:41:34.719000 audit: BPF prog-id=42 op=UNLOAD Dec 13 03:41:34.719000 audit: BPF prog-id=43 op=UNLOAD Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit: BPF prog-id=85 op=LOAD Dec 13 03:41:34.720000 audit: BPF prog-id=75 op=UNLOAD Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.720000 audit: BPF prog-id=86 op=LOAD Dec 13 03:41:34.720000 audit: BPF prog-id=63 op=UNLOAD Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit: BPF prog-id=87 op=LOAD Dec 13 03:41:34.721000 audit: BPF prog-id=44 op=UNLOAD Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit: BPF prog-id=88 op=LOAD Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit: BPF prog-id=89 op=LOAD Dec 13 03:41:34.721000 audit: BPF prog-id=45 op=UNLOAD Dec 13 03:41:34.721000 audit: BPF prog-id=46 op=UNLOAD Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit: BPF prog-id=90 op=LOAD Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit: BPF prog-id=91 op=LOAD Dec 13 03:41:34.722000 audit: BPF prog-id=47 op=UNLOAD Dec 13 03:41:34.722000 audit: BPF prog-id=48 op=UNLOAD Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit: BPF prog-id=92 op=LOAD Dec 13 03:41:34.722000 audit: BPF prog-id=49 op=UNLOAD Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit: BPF prog-id=93 op=LOAD Dec 13 03:41:34.723000 audit: BPF prog-id=59 op=UNLOAD Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.723000 audit: BPF prog-id=94 op=LOAD Dec 13 03:41:34.723000 audit: BPF prog-id=55 op=UNLOAD Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit: BPF prog-id=95 op=LOAD Dec 13 03:41:34.724000 audit: BPF prog-id=50 op=UNLOAD Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit: BPF prog-id=96 op=LOAD Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit: BPF prog-id=97 op=LOAD Dec 13 03:41:34.724000 audit: BPF prog-id=51 op=UNLOAD Dec 13 03:41:34.724000 audit: BPF prog-id=52 op=UNLOAD Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.724000 audit: BPF prog-id=98 op=LOAD Dec 13 03:41:34.724000 audit: BPF prog-id=53 op=UNLOAD Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:34.725000 audit: BPF prog-id=99 op=LOAD Dec 13 03:41:34.725000 audit: BPF prog-id=54 op=UNLOAD Dec 13 03:41:34.732220 systemd[1]: Stopping kubelet.service... Dec 13 03:41:34.751148 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 03:41:34.751644 systemd[1]: Stopped kubelet.service. Dec 13 03:41:34.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:34.756121 systemd[1]: Starting kubelet.service... Dec 13 03:41:35.111229 systemd[1]: Started kubelet.service. Dec 13 03:41:35.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:35.175011 kubelet[2627]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:41:35.175011 kubelet[2627]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:41:35.175011 kubelet[2627]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:41:35.175259 kubelet[2627]: I1213 03:41:35.175009 2627 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:41:35.177855 kubelet[2627]: I1213 03:41:35.177816 2627 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:41:35.177855 kubelet[2627]: I1213 03:41:35.177835 2627 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:41:35.178017 kubelet[2627]: I1213 03:41:35.178009 2627 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:41:35.179135 kubelet[2627]: I1213 03:41:35.179097 2627 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 03:41:35.180278 kubelet[2627]: I1213 03:41:35.180233 2627 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:41:35.214159 kubelet[2627]: I1213 03:41:35.214073 2627 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:41:35.214638 kubelet[2627]: I1213 03:41:35.214605 2627 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:41:35.215103 kubelet[2627]: I1213 03:41:35.215033 2627 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:41:35.215103 kubelet[2627]: I1213 03:41:35.215088 2627 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:41:35.215546 kubelet[2627]: I1213 03:41:35.215119 2627 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:41:35.215546 kubelet[2627]: I1213 03:41:35.215189 2627 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:41:35.215546 kubelet[2627]: I1213 03:41:35.215396 2627 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:41:35.215546 kubelet[2627]: I1213 03:41:35.215450 2627 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:41:35.215546 kubelet[2627]: I1213 03:41:35.215505 2627 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:41:35.216105 kubelet[2627]: I1213 03:41:35.215558 2627 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:41:35.216777 kubelet[2627]: I1213 03:41:35.216718 2627 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:41:35.217254 kubelet[2627]: I1213 03:41:35.217214 2627 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:41:35.218463 kubelet[2627]: I1213 03:41:35.218422 2627 server.go:1256] "Started kubelet" Dec 13 03:41:35.218655 kubelet[2627]: I1213 03:41:35.218562 2627 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:41:35.219123 kubelet[2627]: I1213 03:41:35.219048 2627 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:41:35.219702 kubelet[2627]: I1213 03:41:35.219651 2627 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:41:35.221000 audit[2627]: AVC avc: denied { mac_admin } for pid=2627 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:35.221000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:35.221000 audit[2627]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a62f00 a1=c00100a4e0 a2=c000a62ed0 a3=25 items=0 ppid=1 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:35.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:35.223318 kubelet[2627]: I1213 03:41:35.223126 2627 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:41:35.222000 audit[2627]: AVC avc: denied { mac_admin } for pid=2627 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:35.222000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:35.222000 audit[2627]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001388000 a1=c00138a000 a2=c001386000 a3=25 items=0 ppid=1 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:35.222000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:35.224383 kubelet[2627]: I1213 03:41:35.223576 2627 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:41:35.224383 kubelet[2627]: I1213 03:41:35.223698 2627 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:41:35.224833 kubelet[2627]: E1213 03:41:35.224747 2627 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-cc0c4ef4b9\" not found" Dec 13 03:41:35.225036 kubelet[2627]: I1213 03:41:35.224942 2627 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:41:35.225188 kubelet[2627]: I1213 03:41:35.225093 2627 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:41:35.225837 kubelet[2627]: I1213 03:41:35.225780 2627 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:41:35.226419 kubelet[2627]: I1213 03:41:35.226336 2627 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:41:35.226734 kubelet[2627]: E1213 03:41:35.226538 2627 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:41:35.226734 kubelet[2627]: I1213 03:41:35.226679 2627 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:41:35.227793 kubelet[2627]: I1213 03:41:35.227694 2627 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:41:35.230847 kubelet[2627]: I1213 03:41:35.230804 2627 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:41:35.242190 kubelet[2627]: I1213 03:41:35.242149 2627 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:41:35.243655 kubelet[2627]: I1213 03:41:35.243623 2627 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:41:35.243845 kubelet[2627]: I1213 03:41:35.243674 2627 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:41:35.243845 kubelet[2627]: I1213 03:41:35.243713 2627 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:41:35.243845 kubelet[2627]: E1213 03:41:35.243787 2627 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 03:41:35.260241 kubelet[2627]: I1213 03:41:35.260224 2627 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:41:35.260241 kubelet[2627]: I1213 03:41:35.260237 2627 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:41:35.260374 kubelet[2627]: I1213 03:41:35.260249 2627 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:41:35.260374 kubelet[2627]: I1213 03:41:35.260360 2627 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 03:41:35.260432 kubelet[2627]: I1213 03:41:35.260376 2627 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 03:41:35.260432 kubelet[2627]: I1213 03:41:35.260381 2627 policy_none.go:49] "None policy: Start" Dec 13 03:41:35.260698 kubelet[2627]: I1213 03:41:35.260688 2627 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:41:35.260747 kubelet[2627]: I1213 03:41:35.260704 2627 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:41:35.260834 kubelet[2627]: I1213 03:41:35.260824 2627 state_mem.go:75] "Updated machine memory state" Dec 13 03:41:35.263079 kubelet[2627]: I1213 03:41:35.263067 2627 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:41:35.262000 audit[2627]: AVC avc: denied { mac_admin } for pid=2627 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:35.262000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:41:35.262000 audit[2627]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00114e870 a1=c00168ca98 a2=c00114e840 a3=25 items=0 ppid=1 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:35.262000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:41:35.263385 kubelet[2627]: I1213 03:41:35.263115 2627 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:41:35.263385 kubelet[2627]: I1213 03:41:35.263312 2627 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:41:35.331137 kubelet[2627]: I1213 03:41:35.331047 2627 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.343071 kubelet[2627]: I1213 03:41:35.343014 2627 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.343291 kubelet[2627]: I1213 03:41:35.343170 2627 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.344986 kubelet[2627]: I1213 03:41:35.344933 2627 topology_manager.go:215] "Topology Admit Handler" podUID="f9414a343ec6ef13b2f7050c778c9a71" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.345159 kubelet[2627]: I1213 03:41:35.345082 2627 topology_manager.go:215] "Topology Admit Handler" podUID="d12ea615d58efd5dcd016dbd60de47da" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.345272 kubelet[2627]: I1213 03:41:35.345205 2627 topology_manager.go:215] "Topology Admit Handler" podUID="b78351c762717855df82a0e63fff3c6a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.354623 kubelet[2627]: W1213 03:41:35.354568 2627 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:35.354623 kubelet[2627]: W1213 03:41:35.354621 2627 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:35.355046 kubelet[2627]: W1213 03:41:35.354653 2627 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:35.355046 kubelet[2627]: E1213 03:41:35.354854 2627 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.426870 kubelet[2627]: I1213 03:41:35.426650 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.426870 kubelet[2627]: I1213 03:41:35.426760 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.426870 kubelet[2627]: I1213 03:41:35.426832 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f9414a343ec6ef13b2f7050c778c9a71-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"f9414a343ec6ef13b2f7050c778c9a71\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.427309 kubelet[2627]: I1213 03:41:35.426888 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.427309 kubelet[2627]: I1213 03:41:35.426949 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d12ea615d58efd5dcd016dbd60de47da-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"d12ea615d58efd5dcd016dbd60de47da\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.427309 kubelet[2627]: I1213 03:41:35.427031 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.427309 kubelet[2627]: I1213 03:41:35.427145 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.427309 kubelet[2627]: I1213 03:41:35.427241 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:35.428065 kubelet[2627]: I1213 03:41:35.427322 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b78351c762717855df82a0e63fff3c6a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9\" (UID: \"b78351c762717855df82a0e63fff3c6a\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:36.215992 kubelet[2627]: I1213 03:41:36.215935 2627 apiserver.go:52] "Watching apiserver" Dec 13 03:41:36.225497 kubelet[2627]: I1213 03:41:36.225449 2627 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:41:36.255644 kubelet[2627]: W1213 03:41:36.255626 2627 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:36.255730 kubelet[2627]: W1213 03:41:36.255656 2627 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:41:36.255730 kubelet[2627]: E1213 03:41:36.255668 2627 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:36.255730 kubelet[2627]: E1213 03:41:36.255693 2627 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:41:36.265291 kubelet[2627]: I1213 03:41:36.265253 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-cc0c4ef4b9" podStartSLOduration=1.265228475 podStartE2EDuration="1.265228475s" podCreationTimestamp="2024-12-13 03:41:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:41:36.265208277 +0000 UTC m=+1.145797785" watchObservedRunningTime="2024-12-13 03:41:36.265228475 +0000 UTC m=+1.145817978" Dec 13 03:41:36.270999 kubelet[2627]: I1213 03:41:36.270983 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-cc0c4ef4b9" podStartSLOduration=1.270953794 podStartE2EDuration="1.270953794s" podCreationTimestamp="2024-12-13 03:41:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:41:36.270801516 +0000 UTC m=+1.151391023" watchObservedRunningTime="2024-12-13 03:41:36.270953794 +0000 UTC m=+1.151543306" Dec 13 03:41:36.276098 kubelet[2627]: I1213 03:41:36.276063 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-cc0c4ef4b9" podStartSLOduration=3.276044878 podStartE2EDuration="3.276044878s" podCreationTimestamp="2024-12-13 03:41:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:41:36.276033105 +0000 UTC m=+1.156622612" watchObservedRunningTime="2024-12-13 03:41:36.276044878 +0000 UTC m=+1.156634393" Dec 13 03:41:39.790819 sudo[1768]: pam_unix(sudo:session): session closed for user root Dec 13 03:41:39.790000 audit[1768]: USER_END pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.791664 sshd[1765]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:39.793123 systemd[1]: sshd@8-147.75.202.177:22-139.178.68.195:53084.service: Deactivated successfully. Dec 13 03:41:39.793566 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 03:41:39.793653 systemd[1]: session-11.scope: Consumed 3.965s CPU time. Dec 13 03:41:39.793988 systemd-logind[1593]: Session 11 logged out. Waiting for processes to exit. Dec 13 03:41:39.794523 systemd-logind[1593]: Removed session 11. Dec 13 03:41:39.817278 kernel: kauditd_printk_skb: 248 callbacks suppressed Dec 13 03:41:39.817321 kernel: audit: type=1106 audit(1734061299.790:787): pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.790000 audit[1768]: CRED_DISP pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.906408 kernel: audit: type=1104 audit(1734061299.790:788): pid=1768 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.980456 update_engine[1549]: I1213 03:41:39.980441 1549 update_attempter.cc:509] Updating boot flags... Dec 13 03:41:39.791000 audit[1765]: USER_END pid=1765 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:40.089334 kernel: audit: type=1106 audit(1734061299.791:789): pid=1765 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:40.089403 kernel: audit: type=1104 audit(1734061299.792:790): pid=1765 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:39.792000 audit[1765]: CRED_DISP pid=1765 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:41:40.179522 kernel: audit: type=1131 audit(1734061299.792:791): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.177:22-139.178.68.195:53084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.202.177:22-139.178.68.195:53084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:46.220000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 03:41:46.220000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005c2d80 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.435804 kernel: audit: type=1400 audit(1734061306.220:792): avc: denied { watch } for pid=2452 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 03:41:46.435850 kernel: audit: type=1300 audit(1734061306.220:792): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005c2d80 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.435868 kernel: audit: type=1327 audit(1734061306.220:792): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.529477 kernel: audit: type=1400 audit(1734061306.250:793): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.620022 kernel: audit: type=1300 audit(1734061306.250:793): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120f6e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120f6e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.741337 kernel: audit: type=1327 audit(1734061306.250:793): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.883200 kubelet[2627]: I1213 03:41:46.883141 2627 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 03:41:46.883388 env[1555]: time="2024-12-13T03:41:46.883325776Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 03:41:46.883501 kubelet[2627]: I1213 03:41:46.883462 2627 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 03:41:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f7af40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:47.047045 kernel: audit: type=1400 audit(1734061306.250:794): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:47.047097 kernel: audit: type=1300 audit(1734061306.250:794): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f7af40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:47.047113 kernel: audit: type=1327 audit(1734061306.250:794): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:47.140899 kernel: audit: type=1400 audit(1734061306.250:795): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000b00a0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.251000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.251000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00003c460 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:41:46.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:47.719798 kubelet[2627]: I1213 03:41:47.719741 2627 topology_manager.go:215] "Topology Admit Handler" podUID="a29fbecb-8570-4a3c-9d2d-010f75117b0d" podNamespace="kube-system" podName="kube-proxy-nz2xz" Dec 13 03:41:47.733266 systemd[1]: Created slice kubepods-besteffort-poda29fbecb_8570_4a3c_9d2d_010f75117b0d.slice. Dec 13 03:41:47.808937 kubelet[2627]: I1213 03:41:47.808879 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a29fbecb-8570-4a3c-9d2d-010f75117b0d-lib-modules\") pod \"kube-proxy-nz2xz\" (UID: \"a29fbecb-8570-4a3c-9d2d-010f75117b0d\") " pod="kube-system/kube-proxy-nz2xz" Dec 13 03:41:47.809292 kubelet[2627]: I1213 03:41:47.808987 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8k2z4\" (UniqueName: \"kubernetes.io/projected/a29fbecb-8570-4a3c-9d2d-010f75117b0d-kube-api-access-8k2z4\") pod \"kube-proxy-nz2xz\" (UID: \"a29fbecb-8570-4a3c-9d2d-010f75117b0d\") " pod="kube-system/kube-proxy-nz2xz" Dec 13 03:41:47.809292 kubelet[2627]: I1213 03:41:47.809225 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a29fbecb-8570-4a3c-9d2d-010f75117b0d-kube-proxy\") pod \"kube-proxy-nz2xz\" (UID: \"a29fbecb-8570-4a3c-9d2d-010f75117b0d\") " pod="kube-system/kube-proxy-nz2xz" Dec 13 03:41:47.809678 kubelet[2627]: I1213 03:41:47.809426 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a29fbecb-8570-4a3c-9d2d-010f75117b0d-xtables-lock\") pod \"kube-proxy-nz2xz\" (UID: \"a29fbecb-8570-4a3c-9d2d-010f75117b0d\") " pod="kube-system/kube-proxy-nz2xz" Dec 13 03:41:47.886029 kubelet[2627]: I1213 03:41:47.885969 2627 topology_manager.go:215] "Topology Admit Handler" podUID="203ecb9c-edb8-44c8-bbc1-d3a172b0c46c" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-mmjvv" Dec 13 03:41:47.900030 systemd[1]: Created slice kubepods-besteffort-pod203ecb9c_edb8_44c8_bbc1_d3a172b0c46c.slice. Dec 13 03:41:47.910194 kubelet[2627]: I1213 03:41:47.910105 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4f47n\" (UniqueName: \"kubernetes.io/projected/203ecb9c-edb8-44c8-bbc1-d3a172b0c46c-kube-api-access-4f47n\") pod \"tigera-operator-c7ccbd65-mmjvv\" (UID: \"203ecb9c-edb8-44c8-bbc1-d3a172b0c46c\") " pod="tigera-operator/tigera-operator-c7ccbd65-mmjvv" Dec 13 03:41:47.910578 kubelet[2627]: I1213 03:41:47.910498 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/203ecb9c-edb8-44c8-bbc1-d3a172b0c46c-var-lib-calico\") pod \"tigera-operator-c7ccbd65-mmjvv\" (UID: \"203ecb9c-edb8-44c8-bbc1-d3a172b0c46c\") " pod="tigera-operator/tigera-operator-c7ccbd65-mmjvv" Dec 13 03:41:48.054781 env[1555]: time="2024-12-13T03:41:48.054571146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nz2xz,Uid:a29fbecb-8570-4a3c-9d2d-010f75117b0d,Namespace:kube-system,Attempt:0,}" Dec 13 03:41:48.077054 env[1555]: time="2024-12-13T03:41:48.076834281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:48.077054 env[1555]: time="2024-12-13T03:41:48.076934461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:48.077054 env[1555]: time="2024-12-13T03:41:48.076993779Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:48.077699 env[1555]: time="2024-12-13T03:41:48.077505207Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d55bf02a1d6e279e111cefeb059e209e20f5919f561a7a07674bc251246de2a pid=2818 runtime=io.containerd.runc.v2 Dec 13 03:41:48.107119 systemd[1]: Started cri-containerd-9d55bf02a1d6e279e111cefeb059e209e20f5919f561a7a07674bc251246de2a.scope. Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.121000 audit: BPF prog-id=100 op=LOAD Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353562663032613164366532373965313131636566656230353965 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353562663032613164366532373965313131636566656230353965 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit: BPF prog-id=101 op=LOAD Dec 13 03:41:48.122000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031c140 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353562663032613164366532373965313131636566656230353965 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.122000 audit: BPF prog-id=102 op=LOAD Dec 13 03:41:48.122000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031c188 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353562663032613164366532373965313131636566656230353965 Dec 13 03:41:48.123000 audit: BPF prog-id=102 op=UNLOAD Dec 13 03:41:48.123000 audit: BPF prog-id=101 op=UNLOAD Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.123000 audit: BPF prog-id=103 op=LOAD Dec 13 03:41:48.123000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031c598 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353562663032613164366532373965313131636566656230353965 Dec 13 03:41:48.137745 env[1555]: time="2024-12-13T03:41:48.137686759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nz2xz,Uid:a29fbecb-8570-4a3c-9d2d-010f75117b0d,Namespace:kube-system,Attempt:0,} returns sandbox id \"9d55bf02a1d6e279e111cefeb059e209e20f5919f561a7a07674bc251246de2a\"" Dec 13 03:41:48.141968 env[1555]: time="2024-12-13T03:41:48.141889848Z" level=info msg="CreateContainer within sandbox \"9d55bf02a1d6e279e111cefeb059e209e20f5919f561a7a07674bc251246de2a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 03:41:48.157139 env[1555]: time="2024-12-13T03:41:48.157021445Z" level=info msg="CreateContainer within sandbox \"9d55bf02a1d6e279e111cefeb059e209e20f5919f561a7a07674bc251246de2a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c9fd8e6b9dd9547078055c5542099d65358ef4956a6921bb0f513439db47ea37\"" Dec 13 03:41:48.158082 env[1555]: time="2024-12-13T03:41:48.157975551Z" level=info msg="StartContainer for \"c9fd8e6b9dd9547078055c5542099d65358ef4956a6921bb0f513439db47ea37\"" Dec 13 03:41:48.193817 systemd[1]: Started cri-containerd-c9fd8e6b9dd9547078055c5542099d65358ef4956a6921bb0f513439db47ea37.scope. Dec 13 03:41:48.206787 env[1555]: time="2024-12-13T03:41:48.206699332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-mmjvv,Uid:203ecb9c-edb8-44c8-bbc1-d3a172b0c46c,Namespace:tigera-operator,Attempt:0,}" Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f429174c4d8 items=0 ppid=2818 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666438653662396464393534373037383035356335353432303939 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.225000 audit: BPF prog-id=104 op=LOAD Dec 13 03:41:48.225000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000219568 items=0 ppid=2818 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666438653662396464393534373037383035356335353432303939 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit: BPF prog-id=105 op=LOAD Dec 13 03:41:48.226000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002195b8 items=0 ppid=2818 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666438653662396464393534373037383035356335353432303939 Dec 13 03:41:48.226000 audit: BPF prog-id=105 op=UNLOAD Dec 13 03:41:48.226000 audit: BPF prog-id=104 op=UNLOAD Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { perfmon } for pid=2858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit[2858]: AVC avc: denied { bpf } for pid=2858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.226000 audit: BPF prog-id=106 op=LOAD Dec 13 03:41:48.226000 audit[2858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000219648 items=0 ppid=2818 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666438653662396464393534373037383035356335353432303939 Dec 13 03:41:48.230478 env[1555]: time="2024-12-13T03:41:48.226483517Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:48.230478 env[1555]: time="2024-12-13T03:41:48.226558803Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:48.230478 env[1555]: time="2024-12-13T03:41:48.226582882Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:48.230478 env[1555]: time="2024-12-13T03:41:48.226915494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cdf2169311c1e6ce1e375d91f5e6f67ab8201a8d63d9c7fd00b9e0385b954af pid=2882 runtime=io.containerd.runc.v2 Dec 13 03:41:48.240082 env[1555]: time="2024-12-13T03:41:48.240031274Z" level=info msg="StartContainer for \"c9fd8e6b9dd9547078055c5542099d65358ef4956a6921bb0f513439db47ea37\" returns successfully" Dec 13 03:41:48.242727 systemd[1]: Started cri-containerd-0cdf2169311c1e6ce1e375d91f5e6f67ab8201a8d63d9c7fd00b9e0385b954af.scope. Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit: BPF prog-id=107 op=LOAD Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2882 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646632313639333131633165366365316533373564393166356536 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2882 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646632313639333131633165366365316533373564393166356536 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.257000 audit: BPF prog-id=108 op=LOAD Dec 13 03:41:48.257000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002188a0 items=0 ppid=2882 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646632313639333131633165366365316533373564393166356536 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit: BPF prog-id=109 op=LOAD Dec 13 03:41:48.258000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002188e8 items=0 ppid=2882 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646632313639333131633165366365316533373564393166356536 Dec 13 03:41:48.258000 audit: BPF prog-id=109 op=UNLOAD Dec 13 03:41:48.258000 audit: BPF prog-id=108 op=UNLOAD Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:48.258000 audit: BPF prog-id=110 op=LOAD Dec 13 03:41:48.258000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218cf8 items=0 ppid=2882 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063646632313639333131633165366365316533373564393166356536 Dec 13 03:41:48.279134 kubelet[2627]: I1213 03:41:48.279105 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-nz2xz" podStartSLOduration=1.279062705 podStartE2EDuration="1.279062705s" podCreationTimestamp="2024-12-13 03:41:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:41:48.278984017 +0000 UTC m=+13.159573527" watchObservedRunningTime="2024-12-13 03:41:48.279062705 +0000 UTC m=+13.159652211" Dec 13 03:41:48.282201 env[1555]: time="2024-12-13T03:41:48.282172038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-mmjvv,Uid:203ecb9c-edb8-44c8-bbc1-d3a172b0c46c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0cdf2169311c1e6ce1e375d91f5e6f67ab8201a8d63d9c7fd00b9e0385b954af\"" Dec 13 03:41:48.282994 env[1555]: time="2024-12-13T03:41:48.282981469Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 03:41:48.288000 audit[2964]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.288000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed7079820 a2=0 a3=7ffed707980c items=0 ppid=2869 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:41:48.288000 audit[2965]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.288000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5a02a330 a2=0 a3=7fff5a02a31c items=0 ppid=2869 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:41:48.289000 audit[2966]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.289000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7e50c3c0 a2=0 a3=7fff7e50c3ac items=0 ppid=2869 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:41:48.289000 audit[2967]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.289000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6b10ff60 a2=0 a3=7ffe6b10ff4c items=0 ppid=2869 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:41:48.289000 audit[2968]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.289000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed3abe070 a2=0 a3=7ffed3abe05c items=0 ppid=2869 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:41:48.290000 audit[2969]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.290000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8e004b50 a2=0 a3=7ffd8e004b3c items=0 ppid=2869 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:41:48.391000 audit[2970]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.391000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe04ebf970 a2=0 a3=7ffe04ebf95c items=0 ppid=2869 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:41:48.398000 audit[2972]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.398000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc054fcfd0 a2=0 a3=7ffc054fcfbc items=0 ppid=2869 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 03:41:48.408000 audit[2975]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.408000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe9f23faf0 a2=0 a3=7ffe9f23fadc items=0 ppid=2869 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 03:41:48.411000 audit[2976]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.411000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb5776280 a2=0 a3=7ffdb577626c items=0 ppid=2869 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:41:48.417000 audit[2978]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.417000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffff384130 a2=0 a3=7fffff38411c items=0 ppid=2869 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:41:48.420000 audit[2979]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.420000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe923199c0 a2=0 a3=7ffe923199ac items=0 ppid=2869 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:41:48.427000 audit[2981]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.427000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb80ba600 a2=0 a3=7fffb80ba5ec items=0 ppid=2869 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:41:48.436000 audit[2984]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.436000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea95e2f20 a2=0 a3=7ffea95e2f0c items=0 ppid=2869 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 03:41:48.438000 audit[2985]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.438000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc25c5f290 a2=0 a3=7ffc25c5f27c items=0 ppid=2869 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:41:48.445000 audit[2987]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.445000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc804aa720 a2=0 a3=7ffc804aa70c items=0 ppid=2869 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:41:48.447000 audit[2988]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.447000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff89e46160 a2=0 a3=7fff89e4614c items=0 ppid=2869 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:41:48.454000 audit[2990]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.454000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8e707f10 a2=0 a3=7ffe8e707efc items=0 ppid=2869 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:41:48.463000 audit[2993]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.463000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc213d85f0 a2=0 a3=7ffc213d85dc items=0 ppid=2869 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:41:48.472000 audit[2996]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.472000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0d701390 a2=0 a3=7fff0d70137c items=0 ppid=2869 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:41:48.474000 audit[2997]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.474000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd03941e0 a2=0 a3=7ffcd03941cc items=0 ppid=2869 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:41:48.480000 audit[2999]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.480000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef42d7970 a2=0 a3=7ffef42d795c items=0 ppid=2869 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:41:48.489000 audit[3002]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.489000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc802868a0 a2=0 a3=7ffc8028688c items=0 ppid=2869 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:41:48.492000 audit[3003]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.492000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec3735b50 a2=0 a3=7ffec3735b3c items=0 ppid=2869 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:41:48.498000 audit[3005]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:41:48.498000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffed5652a80 a2=0 a3=7ffed5652a6c items=0 ppid=2869 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:41:48.548000 audit[3011]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:48.548000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdfc5c3730 a2=0 a3=7ffdfc5c371c items=0 ppid=2869 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:48.567000 audit[3011]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:48.567000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdfc5c3730 a2=0 a3=7ffdfc5c371c items=0 ppid=2869 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:48.569000 audit[3016]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.569000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0871a230 a2=0 a3=7fff0871a21c items=0 ppid=2869 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:41:48.571000 audit[3018]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.571000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffedcabea30 a2=0 a3=7ffedcabea1c items=0 ppid=2869 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 03:41:48.575000 audit[3021]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.575000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc933558f0 a2=0 a3=7ffc933558dc items=0 ppid=2869 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 03:41:48.577000 audit[3022]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3022 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.577000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc166eb400 a2=0 a3=7ffc166eb3ec items=0 ppid=2869 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:41:48.579000 audit[3024]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.579000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9c31a360 a2=0 a3=7ffd9c31a34c items=0 ppid=2869 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:41:48.580000 audit[3025]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.580000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed2d8e6f0 a2=0 a3=7ffed2d8e6dc items=0 ppid=2869 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:41:48.583000 audit[3027]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.583000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7a117b30 a2=0 a3=7ffc7a117b1c items=0 ppid=2869 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 03:41:48.587000 audit[3030]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.587000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd9157a8e0 a2=0 a3=7ffd9157a8cc items=0 ppid=2869 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:41:48.588000 audit[3031]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.588000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff700fd870 a2=0 a3=7fff700fd85c items=0 ppid=2869 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:41:48.591000 audit[3033]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.591000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8d84d0d0 a2=0 a3=7ffc8d84d0bc items=0 ppid=2869 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:41:48.592000 audit[3034]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.592000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1fd98ae0 a2=0 a3=7ffe1fd98acc items=0 ppid=2869 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:41:48.595000 audit[3036]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.595000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2a8a6a30 a2=0 a3=7ffc2a8a6a1c items=0 ppid=2869 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:41:48.599000 audit[3039]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.599000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1fa5ae60 a2=0 a3=7fff1fa5ae4c items=0 ppid=2869 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:41:48.604000 audit[3042]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.604000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0f8904a0 a2=0 a3=7ffd0f89048c items=0 ppid=2869 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 03:41:48.606000 audit[3043]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.606000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff99573460 a2=0 a3=7fff9957344c items=0 ppid=2869 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:41:48.611000 audit[3045]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3045 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.611000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc03d4f090 a2=0 a3=7ffc03d4f07c items=0 ppid=2869 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:41:48.620000 audit[3048]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.620000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc1dae2d70 a2=0 a3=7ffc1dae2d5c items=0 ppid=2869 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:41:48.622000 audit[3049]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.622000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda7a844f0 a2=0 a3=7ffda7a844dc items=0 ppid=2869 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:41:48.628000 audit[3051]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.628000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff2a366150 a2=0 a3=7fff2a36613c items=0 ppid=2869 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:41:48.631000 audit[3052]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.631000 audit[3052]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5fbffd30 a2=0 a3=7ffc5fbffd1c items=0 ppid=2869 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:41:48.636000 audit[3054]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.636000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff74f91280 a2=0 a3=7fff74f9126c items=0 ppid=2869 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:41:48.645000 audit[3057]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:41:48.645000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcafec6010 a2=0 a3=7ffcafec5ffc items=0 ppid=2869 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:41:48.652000 audit[3059]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:41:48.652000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc69350420 a2=0 a3=7ffc6935040c items=0 ppid=2869 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.652000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:48.653000 audit[3059]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:41:48.653000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc69350420 a2=0 a3=7ffc6935040c items=0 ppid=2869 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:48.653000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:49.745388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1639968556.mount: Deactivated successfully. Dec 13 03:41:50.384485 env[1555]: time="2024-12-13T03:41:50.384463081Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:50.385062 env[1555]: time="2024-12-13T03:41:50.385051130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:50.385934 env[1555]: time="2024-12-13T03:41:50.385900779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:50.386552 env[1555]: time="2024-12-13T03:41:50.386540216Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:50.386849 env[1555]: time="2024-12-13T03:41:50.386838402Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 03:41:50.387837 env[1555]: time="2024-12-13T03:41:50.387820715Z" level=info msg="CreateContainer within sandbox \"0cdf2169311c1e6ce1e375d91f5e6f67ab8201a8d63d9c7fd00b9e0385b954af\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 03:41:50.392497 env[1555]: time="2024-12-13T03:41:50.392465358Z" level=info msg="CreateContainer within sandbox \"0cdf2169311c1e6ce1e375d91f5e6f67ab8201a8d63d9c7fd00b9e0385b954af\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5948fa4df9ac8e6d93323c8a84481db10e01b2dc5f3a0ff5759e0c6c2bc217cb\"" Dec 13 03:41:50.392849 env[1555]: time="2024-12-13T03:41:50.392817787Z" level=info msg="StartContainer for \"5948fa4df9ac8e6d93323c8a84481db10e01b2dc5f3a0ff5759e0c6c2bc217cb\"" Dec 13 03:41:50.402655 systemd[1]: Started cri-containerd-5948fa4df9ac8e6d93323c8a84481db10e01b2dc5f3a0ff5759e0c6c2bc217cb.scope. Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit: BPF prog-id=111 op=LOAD Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2882 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:50.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539343866613464663961633865366439333332336338613834343831 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2882 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:50.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539343866613464663961633865366439333332336338613834343831 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit: BPF prog-id=112 op=LOAD Dec 13 03:41:50.407000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002677d0 items=0 ppid=2882 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:50.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539343866613464663961633865366439333332336338613834343831 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit: BPF prog-id=113 op=LOAD Dec 13 03:41:50.407000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000267818 items=0 ppid=2882 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:50.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539343866613464663961633865366439333332336338613834343831 Dec 13 03:41:50.407000 audit: BPF prog-id=113 op=UNLOAD Dec 13 03:41:50.407000 audit: BPF prog-id=112 op=UNLOAD Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:50.407000 audit: BPF prog-id=114 op=LOAD Dec 13 03:41:50.407000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000267c28 items=0 ppid=2882 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:50.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539343866613464663961633865366439333332336338613834343831 Dec 13 03:41:50.412958 env[1555]: time="2024-12-13T03:41:50.412929822Z" level=info msg="StartContainer for \"5948fa4df9ac8e6d93323c8a84481db10e01b2dc5f3a0ff5759e0c6c2bc217cb\" returns successfully" Dec 13 03:41:51.295129 kubelet[2627]: I1213 03:41:51.295068 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-mmjvv" podStartSLOduration=2.190703312 podStartE2EDuration="4.294967591s" podCreationTimestamp="2024-12-13 03:41:47 +0000 UTC" firstStartedPulling="2024-12-13 03:41:48.282761221 +0000 UTC m=+13.163350729" lastFinishedPulling="2024-12-13 03:41:50.387025501 +0000 UTC m=+15.267615008" observedRunningTime="2024-12-13 03:41:51.294600211 +0000 UTC m=+16.175189777" watchObservedRunningTime="2024-12-13 03:41:51.294967591 +0000 UTC m=+16.175557140" Dec 13 03:41:53.120000 audit[3113]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.147621 kernel: kauditd_printk_skb: 372 callbacks suppressed Dec 13 03:41:53.147661 kernel: audit: type=1325 audit(1734061313.120:908): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.120000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffce2867b0 a2=0 a3=7fffce28679c items=0 ppid=2869 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.255550 kubelet[2627]: I1213 03:41:53.255527 2627 topology_manager.go:215] "Topology Admit Handler" podUID="e8cca25b-a856-42b9-890e-50765881384f" podNamespace="calico-system" podName="calico-typha-fb4ffd7bb-w7k5h" Dec 13 03:41:53.258892 systemd[1]: Created slice kubepods-besteffort-pode8cca25b_a856_42b9_890e_50765881384f.slice. Dec 13 03:41:53.304264 kernel: audit: type=1300 audit(1734061313.120:908): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffce2867b0 a2=0 a3=7fffce28679c items=0 ppid=2869 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.347676 kubelet[2627]: I1213 03:41:53.347653 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sb5bk\" (UniqueName: \"kubernetes.io/projected/e8cca25b-a856-42b9-890e-50765881384f-kube-api-access-sb5bk\") pod \"calico-typha-fb4ffd7bb-w7k5h\" (UID: \"e8cca25b-a856-42b9-890e-50765881384f\") " pod="calico-system/calico-typha-fb4ffd7bb-w7k5h" Dec 13 03:41:53.347753 kubelet[2627]: I1213 03:41:53.347712 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e8cca25b-a856-42b9-890e-50765881384f-typha-certs\") pod \"calico-typha-fb4ffd7bb-w7k5h\" (UID: \"e8cca25b-a856-42b9-890e-50765881384f\") " pod="calico-system/calico-typha-fb4ffd7bb-w7k5h" Dec 13 03:41:53.347753 kubelet[2627]: I1213 03:41:53.347732 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e8cca25b-a856-42b9-890e-50765881384f-tigera-ca-bundle\") pod \"calico-typha-fb4ffd7bb-w7k5h\" (UID: \"e8cca25b-a856-42b9-890e-50765881384f\") " pod="calico-system/calico-typha-fb4ffd7bb-w7k5h" Dec 13 03:41:53.363426 kernel: audit: type=1327 audit(1734061313.120:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.365000 audit[3113]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.386314 kubelet[2627]: I1213 03:41:53.386252 2627 topology_manager.go:215] "Topology Admit Handler" podUID="de2aa9ff-6c13-4510-9bd4-5ec21f419bf4" podNamespace="calico-system" podName="calico-node-qp4nk" Dec 13 03:41:53.389137 systemd[1]: Created slice kubepods-besteffort-podde2aa9ff_6c13_4510_9bd4_5ec21f419bf4.slice. Dec 13 03:41:53.365000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffce2867b0 a2=0 a3=0 items=0 ppid=2869 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.448113 kubelet[2627]: I1213 03:41:53.448095 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-cni-bin-dir\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448113 kubelet[2627]: I1213 03:41:53.448120 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-lib-modules\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448247 kubelet[2627]: I1213 03:41:53.448157 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-var-run-calico\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448247 kubelet[2627]: I1213 03:41:53.448191 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-xtables-lock\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448247 kubelet[2627]: I1213 03:41:53.448223 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-var-lib-calico\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448346 kubelet[2627]: I1213 03:41:53.448256 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-cni-log-dir\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448346 kubelet[2627]: I1213 03:41:53.448291 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-cni-net-dir\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448346 kubelet[2627]: I1213 03:41:53.448312 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-flexvol-driver-host\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448421 kubelet[2627]: I1213 03:41:53.448357 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-tigera-ca-bundle\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448451 kubelet[2627]: I1213 03:41:53.448425 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-488m5\" (UniqueName: \"kubernetes.io/projected/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-kube-api-access-488m5\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448473 kubelet[2627]: I1213 03:41:53.448464 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-policysync\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.448499 kubelet[2627]: I1213 03:41:53.448478 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/de2aa9ff-6c13-4510-9bd4-5ec21f419bf4-node-certs\") pod \"calico-node-qp4nk\" (UID: \"de2aa9ff-6c13-4510-9bd4-5ec21f419bf4\") " pod="calico-system/calico-node-qp4nk" Dec 13 03:41:53.489927 kubelet[2627]: I1213 03:41:53.489909 2627 topology_manager.go:215] "Topology Admit Handler" podUID="3407265a-adff-46de-9c22-bac179aa2a85" podNamespace="calico-system" podName="csi-node-driver-l68ds" Dec 13 03:41:53.490074 kubelet[2627]: E1213 03:41:53.490068 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:41:53.521246 kernel: audit: type=1325 audit(1734061313.365:909): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.521313 kernel: audit: type=1300 audit(1734061313.365:909): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffce2867b0 a2=0 a3=0 items=0 ppid=2869 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.521327 kernel: audit: type=1327 audit(1734061313.365:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.548805 kubelet[2627]: I1213 03:41:53.548761 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3407265a-adff-46de-9c22-bac179aa2a85-socket-dir\") pod \"csi-node-driver-l68ds\" (UID: \"3407265a-adff-46de-9c22-bac179aa2a85\") " pod="calico-system/csi-node-driver-l68ds" Dec 13 03:41:53.548805 kubelet[2627]: I1213 03:41:53.548801 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3407265a-adff-46de-9c22-bac179aa2a85-varrun\") pod \"csi-node-driver-l68ds\" (UID: \"3407265a-adff-46de-9c22-bac179aa2a85\") " pod="calico-system/csi-node-driver-l68ds" Dec 13 03:41:53.548924 kubelet[2627]: I1213 03:41:53.548838 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gfg6l\" (UniqueName: \"kubernetes.io/projected/3407265a-adff-46de-9c22-bac179aa2a85-kube-api-access-gfg6l\") pod \"csi-node-driver-l68ds\" (UID: \"3407265a-adff-46de-9c22-bac179aa2a85\") " pod="calico-system/csi-node-driver-l68ds" Dec 13 03:41:53.548924 kubelet[2627]: I1213 03:41:53.548868 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3407265a-adff-46de-9c22-bac179aa2a85-registration-dir\") pod \"csi-node-driver-l68ds\" (UID: \"3407265a-adff-46de-9c22-bac179aa2a85\") " pod="calico-system/csi-node-driver-l68ds" Dec 13 03:41:53.548924 kubelet[2627]: I1213 03:41:53.548880 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3407265a-adff-46de-9c22-bac179aa2a85-kubelet-dir\") pod \"csi-node-driver-l68ds\" (UID: \"3407265a-adff-46de-9c22-bac179aa2a85\") " pod="calico-system/csi-node-driver-l68ds" Dec 13 03:41:53.549614 kubelet[2627]: E1213 03:41:53.549577 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.549614 kubelet[2627]: W1213 03:41:53.549585 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.549614 kubelet[2627]: E1213 03:41:53.549597 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.550646 kubelet[2627]: E1213 03:41:53.550611 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.550646 kubelet[2627]: W1213 03:41:53.550618 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.550646 kubelet[2627]: E1213 03:41:53.550626 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.554577 kubelet[2627]: E1213 03:41:53.554541 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.554577 kubelet[2627]: W1213 03:41:53.554548 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.554577 kubelet[2627]: E1213 03:41:53.554557 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.560990 env[1555]: time="2024-12-13T03:41:53.560965155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fb4ffd7bb-w7k5h,Uid:e8cca25b-a856-42b9-890e-50765881384f,Namespace:calico-system,Attempt:0,}" Dec 13 03:41:53.568003 env[1555]: time="2024-12-13T03:41:53.567970502Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:53.568003 env[1555]: time="2024-12-13T03:41:53.567990492Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:53.568003 env[1555]: time="2024-12-13T03:41:53.567997312Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:53.568120 env[1555]: time="2024-12-13T03:41:53.568101605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/794a70df112f806db906b20b5075fee72ee420782acbf6a1d1efde13e688750c pid=3130 runtime=io.containerd.runc.v2 Dec 13 03:41:53.573450 systemd[1]: Started cri-containerd-794a70df112f806db906b20b5075fee72ee420782acbf6a1d1efde13e688750c.scope. Dec 13 03:41:53.524000 audit[3117]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.638833 kernel: audit: type=1325 audit(1734061313.524:910): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.638890 kernel: audit: type=1300 audit(1734061313.524:910): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd1523ed60 a2=0 a3=7ffd1523ed4c items=0 ppid=2869 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.524000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd1523ed60 a2=0 a3=7ffd1523ed4c items=0 ppid=2869 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.649548 kubelet[2627]: E1213 03:41:53.649529 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.649548 kubelet[2627]: W1213 03:41:53.649539 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.649548 kubelet[2627]: E1213 03:41:53.649554 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.649702 kubelet[2627]: E1213 03:41:53.649693 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.649702 kubelet[2627]: W1213 03:41:53.649699 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.649764 kubelet[2627]: E1213 03:41:53.649708 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.649832 kubelet[2627]: E1213 03:41:53.649825 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.649832 kubelet[2627]: W1213 03:41:53.649830 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.649897 kubelet[2627]: E1213 03:41:53.649838 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.649953 kubelet[2627]: E1213 03:41:53.649944 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.649953 kubelet[2627]: W1213 03:41:53.649948 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650015 kubelet[2627]: E1213 03:41:53.649957 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650056 kubelet[2627]: E1213 03:41:53.650047 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650056 kubelet[2627]: W1213 03:41:53.650051 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650056 kubelet[2627]: E1213 03:41:53.650057 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650173 kubelet[2627]: E1213 03:41:53.650163 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650205 kubelet[2627]: W1213 03:41:53.650174 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650205 kubelet[2627]: E1213 03:41:53.650189 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650289 kubelet[2627]: E1213 03:41:53.650279 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650289 kubelet[2627]: W1213 03:41:53.650284 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650370 kubelet[2627]: E1213 03:41:53.650294 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650370 kubelet[2627]: E1213 03:41:53.650368 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650429 kubelet[2627]: W1213 03:41:53.650372 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650429 kubelet[2627]: E1213 03:41:53.650380 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650527 kubelet[2627]: E1213 03:41:53.650518 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650527 kubelet[2627]: W1213 03:41:53.650524 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650614 kubelet[2627]: E1213 03:41:53.650533 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650649 kubelet[2627]: E1213 03:41:53.650618 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650649 kubelet[2627]: W1213 03:41:53.650622 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650649 kubelet[2627]: E1213 03:41:53.650629 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650752 kubelet[2627]: E1213 03:41:53.650696 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650752 kubelet[2627]: W1213 03:41:53.650700 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650752 kubelet[2627]: E1213 03:41:53.650709 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650871 kubelet[2627]: E1213 03:41:53.650785 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650871 kubelet[2627]: W1213 03:41:53.650789 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650871 kubelet[2627]: E1213 03:41:53.650795 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650871 kubelet[2627]: E1213 03:41:53.650872 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650995 kubelet[2627]: W1213 03:41:53.650879 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650995 kubelet[2627]: E1213 03:41:53.650890 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.650995 kubelet[2627]: E1213 03:41:53.650983 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.650995 kubelet[2627]: W1213 03:41:53.650988 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.650995 kubelet[2627]: E1213 03:41:53.650995 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651171 kubelet[2627]: E1213 03:41:53.651074 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651171 kubelet[2627]: W1213 03:41:53.651081 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651171 kubelet[2627]: E1213 03:41:53.651095 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651171 kubelet[2627]: E1213 03:41:53.651168 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651300 kubelet[2627]: W1213 03:41:53.651174 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651300 kubelet[2627]: E1213 03:41:53.651186 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651300 kubelet[2627]: E1213 03:41:53.651258 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651300 kubelet[2627]: W1213 03:41:53.651264 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651300 kubelet[2627]: E1213 03:41:53.651275 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651471 kubelet[2627]: E1213 03:41:53.651362 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651471 kubelet[2627]: W1213 03:41:53.651366 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651471 kubelet[2627]: E1213 03:41:53.651374 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651471 kubelet[2627]: E1213 03:41:53.651463 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651471 kubelet[2627]: W1213 03:41:53.651467 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651471 kubelet[2627]: E1213 03:41:53.651473 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651639 kubelet[2627]: E1213 03:41:53.651543 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651639 kubelet[2627]: W1213 03:41:53.651547 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651639 kubelet[2627]: E1213 03:41:53.651554 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651639 kubelet[2627]: E1213 03:41:53.651624 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651639 kubelet[2627]: W1213 03:41:53.651628 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651639 kubelet[2627]: E1213 03:41:53.651635 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651819 kubelet[2627]: E1213 03:41:53.651720 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651819 kubelet[2627]: W1213 03:41:53.651724 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651819 kubelet[2627]: E1213 03:41:53.651730 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.651819 kubelet[2627]: E1213 03:41:53.651800 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.651819 kubelet[2627]: W1213 03:41:53.651804 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.651819 kubelet[2627]: E1213 03:41:53.651810 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.652000 kubelet[2627]: E1213 03:41:53.651875 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.652000 kubelet[2627]: W1213 03:41:53.651879 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.652000 kubelet[2627]: E1213 03:41:53.651884 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.652000 kubelet[2627]: E1213 03:41:53.651963 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.652000 kubelet[2627]: W1213 03:41:53.651967 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.652000 kubelet[2627]: E1213 03:41:53.651972 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.656067 kubelet[2627]: E1213 03:41:53.656057 2627 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:41:53.656067 kubelet[2627]: W1213 03:41:53.656063 2627 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:41:53.656153 kubelet[2627]: E1213 03:41:53.656071 2627 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:41:53.690807 env[1555]: time="2024-12-13T03:41:53.690777051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qp4nk,Uid:de2aa9ff-6c13-4510-9bd4-5ec21f419bf4,Namespace:calico-system,Attempt:0,}" Dec 13 03:41:53.697112 env[1555]: time="2024-12-13T03:41:53.697073010Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:41:53.697112 env[1555]: time="2024-12-13T03:41:53.697098995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:41:53.697112 env[1555]: time="2024-12-13T03:41:53.697108611Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:41:53.697285 env[1555]: time="2024-12-13T03:41:53.697169893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30 pid=3189 runtime=io.containerd.runc.v2 Dec 13 03:41:53.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.795229 kernel: audit: type=1327 audit(1734061313.524:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.795316 kernel: audit: type=1400 audit(1734061313.586:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.796723 systemd[1]: Started cri-containerd-0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30.scope. Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.794000 audit: BPF prog-id=115 op=LOAD Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3130 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739346137306466313132663830366462393036623230623530373566 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3130 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739346137306466313132663830366462393036623230623530373566 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3117]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:53.795000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd1523ed60 a2=0 a3=0 items=0 ppid=2869 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.795000 audit: BPF prog-id=116 op=LOAD Dec 13 03:41:53.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit: BPF prog-id=117 op=LOAD Dec 13 03:41:53.795000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255a20 items=0 ppid=3130 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739346137306466313132663830366462393036623230623530373566 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit: BPF prog-id=118 op=LOAD Dec 13 03:41:53.858000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000255a68 items=0 ppid=3130 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739346137306466313132663830366462393036623230623530373566 Dec 13 03:41:53.858000 audit: BPF prog-id=118 op=UNLOAD Dec 13 03:41:53.858000 audit: BPF prog-id=116 op=UNLOAD Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { perfmon } for pid=3139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3139]: AVC avc: denied { bpf } for pid=3139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit: BPF prog-id=119 op=LOAD Dec 13 03:41:53.858000 audit[3139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000255e78 items=0 ppid=3130 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739346137306466313132663830366462393036623230623530373566 Dec 13 03:41:53.858000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.858000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3189 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333864343462366430323762646532336239333934366339373832 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3189 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333864343462366430323762646532336239333934366339373832 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit: BPF prog-id=120 op=LOAD Dec 13 03:41:53.859000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000318240 items=0 ppid=3189 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333864343462366430323762646532336239333934366339373832 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit: BPF prog-id=121 op=LOAD Dec 13 03:41:53.859000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000318288 items=0 ppid=3189 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333864343462366430323762646532336239333934366339373832 Dec 13 03:41:53.859000 audit: BPF prog-id=121 op=UNLOAD Dec 13 03:41:53.859000 audit: BPF prog-id=120 op=UNLOAD Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:53.859000 audit: BPF prog-id=122 op=LOAD Dec 13 03:41:53.859000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000318698 items=0 ppid=3189 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333864343462366430323762646532336239333934366339373832 Dec 13 03:41:53.864560 env[1555]: time="2024-12-13T03:41:53.864533269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qp4nk,Uid:de2aa9ff-6c13-4510-9bd4-5ec21f419bf4,Namespace:calico-system,Attempt:0,} returns sandbox id \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\"" Dec 13 03:41:53.865231 env[1555]: time="2024-12-13T03:41:53.865218175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 03:41:53.876522 env[1555]: time="2024-12-13T03:41:53.876469143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fb4ffd7bb-w7k5h,Uid:e8cca25b-a856-42b9-890e-50765881384f,Namespace:calico-system,Attempt:0,} returns sandbox id \"794a70df112f806db906b20b5075fee72ee420782acbf6a1d1efde13e688750c\"" Dec 13 03:41:55.244691 kubelet[2627]: E1213 03:41:55.244649 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:41:55.258204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2364131519.mount: Deactivated successfully. Dec 13 03:41:55.341734 env[1555]: time="2024-12-13T03:41:55.341711907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:55.342216 env[1555]: time="2024-12-13T03:41:55.342177440Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:55.342852 env[1555]: time="2024-12-13T03:41:55.342839125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:55.343755 env[1555]: time="2024-12-13T03:41:55.343742338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:55.343957 env[1555]: time="2024-12-13T03:41:55.343942020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 03:41:55.344163 env[1555]: time="2024-12-13T03:41:55.344150624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 03:41:55.344709 env[1555]: time="2024-12-13T03:41:55.344663930Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:41:55.349650 env[1555]: time="2024-12-13T03:41:55.349603803Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c\"" Dec 13 03:41:55.349840 env[1555]: time="2024-12-13T03:41:55.349799685Z" level=info msg="StartContainer for \"98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c\"" Dec 13 03:41:55.357582 systemd[1]: Started cri-containerd-98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c.scope. Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa898238a28 items=0 ppid=3189 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:55.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938653362623837626265653539653666393066343163643139333332 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit: BPF prog-id=123 op=LOAD Dec 13 03:41:55.365000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a7338 items=0 ppid=3189 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:55.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938653362623837626265653539653666393066343163643139333332 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit: BPF prog-id=124 op=LOAD Dec 13 03:41:55.365000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a7388 items=0 ppid=3189 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:55.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938653362623837626265653539653666393066343163643139333332 Dec 13 03:41:55.365000 audit: BPF prog-id=124 op=UNLOAD Dec 13 03:41:55.365000 audit: BPF prog-id=123 op=UNLOAD Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:55.365000 audit: BPF prog-id=125 op=LOAD Dec 13 03:41:55.365000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a7418 items=0 ppid=3189 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:55.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938653362623837626265653539653666393066343163643139333332 Dec 13 03:41:55.371246 env[1555]: time="2024-12-13T03:41:55.371220187Z" level=info msg="StartContainer for \"98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c\" returns successfully" Dec 13 03:41:55.376703 systemd[1]: cri-containerd-98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c.scope: Deactivated successfully. Dec 13 03:41:55.389000 audit: BPF prog-id=125 op=UNLOAD Dec 13 03:41:55.455118 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c-rootfs.mount: Deactivated successfully. Dec 13 03:41:55.631208 env[1555]: time="2024-12-13T03:41:55.630994361Z" level=info msg="shim disconnected" id=98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c Dec 13 03:41:55.631208 env[1555]: time="2024-12-13T03:41:55.631107807Z" level=warning msg="cleaning up after shim disconnected" id=98e3bb87bbee59e6f90f41cd193325fd4eaf879d8da8945cebcc2d379d8b453c namespace=k8s.io Dec 13 03:41:55.631208 env[1555]: time="2024-12-13T03:41:55.631141794Z" level=info msg="cleaning up dead shim" Dec 13 03:41:55.646684 env[1555]: time="2024-12-13T03:41:55.646578864Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:41:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3277 runtime=io.containerd.runc.v2\n" Dec 13 03:41:56.429617 systemd[1]: Started sshd@9-147.75.202.177:22-218.92.0.223:17066.service. Dec 13 03:41:56.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.202.177:22-218.92.0.223:17066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:57.244488 kubelet[2627]: E1213 03:41:57.244442 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:41:57.486439 sshd[3296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:41:57.486000 audit[3296]: USER_AUTH pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:41:58.486828 env[1555]: time="2024-12-13T03:41:58.486753328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:58.487633 env[1555]: time="2024-12-13T03:41:58.487581459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:58.489148 env[1555]: time="2024-12-13T03:41:58.489093711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:58.490547 env[1555]: time="2024-12-13T03:41:58.490491640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:41:58.491365 env[1555]: time="2024-12-13T03:41:58.491293901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 03:41:58.491894 env[1555]: time="2024-12-13T03:41:58.491839095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 03:41:58.498502 env[1555]: time="2024-12-13T03:41:58.498460919Z" level=info msg="CreateContainer within sandbox \"794a70df112f806db906b20b5075fee72ee420782acbf6a1d1efde13e688750c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 03:41:58.503607 env[1555]: time="2024-12-13T03:41:58.503560984Z" level=info msg="CreateContainer within sandbox \"794a70df112f806db906b20b5075fee72ee420782acbf6a1d1efde13e688750c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"72159ed2808afa1ce36f46ae5cf6742673a547dea2e0adc79246ab6bfde4e949\"" Dec 13 03:41:58.503827 env[1555]: time="2024-12-13T03:41:58.503810413Z" level=info msg="StartContainer for \"72159ed2808afa1ce36f46ae5cf6742673a547dea2e0adc79246ab6bfde4e949\"" Dec 13 03:41:58.512895 systemd[1]: Started cri-containerd-72159ed2808afa1ce36f46ae5cf6742673a547dea2e0adc79246ab6bfde4e949.scope. Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.546133 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 03:41:58.546210 kernel: audit: type=1400 audit(1734061318.518:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673042 kernel: audit: type=1400 audit(1734061318.518:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673082 kernel: audit: type=1400 audit(1734061318.518:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.799912 kernel: audit: type=1400 audit(1734061318.518:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.799950 kernel: audit: type=1400 audit(1734061318.518:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863694 kernel: audit: type=1400 audit(1734061318.518:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.927461 kernel: audit: type=1400 audit(1734061318.518:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.991267 kernel: audit: type=1400 audit(1734061318.518:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:59.054987 kernel: audit: type=1400 audit(1734061318.518:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:59.118369 kernel: audit: type=1400 audit(1734061318.672:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.672000 audit: BPF prog-id=126 op=LOAD Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3130 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313539656432383038616661316365333666343661653563663637 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3130 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313539656432383038616661316365333666343661653563663637 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.673000 audit: BPF prog-id=127 op=LOAD Dec 13 03:41:58.673000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000246a0 items=0 ppid=3130 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313539656432383038616661316365333666343661653563663637 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.735000 audit: BPF prog-id=128 op=LOAD Dec 13 03:41:58.735000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000246e8 items=0 ppid=3130 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:58.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313539656432383038616661316365333666343661653563663637 Dec 13 03:41:58.863000 audit: BPF prog-id=128 op=UNLOAD Dec 13 03:41:58.863000 audit: BPF prog-id=127 op=UNLOAD Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:41:58.863000 audit: BPF prog-id=129 op=LOAD Dec 13 03:41:58.863000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024af8 items=0 ppid=3130 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:58.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313539656432383038616661316365333666343661653563663637 Dec 13 03:41:59.197562 env[1555]: time="2024-12-13T03:41:59.197508143Z" level=info msg="StartContainer for \"72159ed2808afa1ce36f46ae5cf6742673a547dea2e0adc79246ab6bfde4e949\" returns successfully" Dec 13 03:41:59.244584 kubelet[2627]: E1213 03:41:59.244562 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:41:59.323026 kubelet[2627]: I1213 03:41:59.322824 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-fb4ffd7bb-w7k5h" podStartSLOduration=1.708092766 podStartE2EDuration="6.322726313s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:41:53.87696793 +0000 UTC m=+18.757557433" lastFinishedPulling="2024-12-13 03:41:58.491601452 +0000 UTC m=+23.372190980" observedRunningTime="2024-12-13 03:41:59.322425899 +0000 UTC m=+24.203015507" watchObservedRunningTime="2024-12-13 03:41:59.322726313 +0000 UTC m=+24.203315884" Dec 13 03:41:59.733517 sshd[3296]: Failed password for root from 218.92.0.223 port 17066 ssh2 Dec 13 03:42:00.310387 kubelet[2627]: I1213 03:42:00.310320 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:01.244603 kubelet[2627]: E1213 03:42:01.244577 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:42:01.793000 audit[3296]: USER_AUTH pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:03.032262 env[1555]: time="2024-12-13T03:42:03.032239102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:03.033742 env[1555]: time="2024-12-13T03:42:03.033726557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:03.034308 env[1555]: time="2024-12-13T03:42:03.034295886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:03.034999 env[1555]: time="2024-12-13T03:42:03.034987666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:03.035419 env[1555]: time="2024-12-13T03:42:03.035390773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 03:42:03.036488 env[1555]: time="2024-12-13T03:42:03.036472524Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:42:03.041831 env[1555]: time="2024-12-13T03:42:03.041782775Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454\"" Dec 13 03:42:03.042126 env[1555]: time="2024-12-13T03:42:03.042101099Z" level=info msg="StartContainer for \"ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454\"" Dec 13 03:42:03.053738 systemd[1]: Started cri-containerd-ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454.scope. Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7fd55b5138 items=0 ppid=3189 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633736636265303165393961386439376166626239373665623861 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit: BPF prog-id=130 op=LOAD Dec 13 03:42:03.059000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002fbf68 items=0 ppid=3189 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633736636265303165393961386439376166626239373665623861 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit: BPF prog-id=131 op=LOAD Dec 13 03:42:03.059000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002fbfb8 items=0 ppid=3189 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633736636265303165393961386439376166626239373665623861 Dec 13 03:42:03.059000 audit: BPF prog-id=131 op=UNLOAD Dec 13 03:42:03.059000 audit: BPF prog-id=130 op=UNLOAD Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { perfmon } for pid=3353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit[3353]: AVC avc: denied { bpf } for pid=3353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:03.059000 audit: BPF prog-id=132 op=LOAD Dec 13 03:42:03.059000 audit[3353]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ca048 items=0 ppid=3189 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633736636265303165393961386439376166626239373665623861 Dec 13 03:42:03.065884 env[1555]: time="2024-12-13T03:42:03.065859442Z" level=info msg="StartContainer for \"ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454\" returns successfully" Dec 13 03:42:03.244688 kubelet[2627]: E1213 03:42:03.244618 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:42:03.924571 sshd[3296]: Failed password for root from 218.92.0.223 port 17066 ssh2 Dec 13 03:42:03.947955 env[1555]: time="2024-12-13T03:42:03.947791205Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:42:03.951255 systemd[1]: cri-containerd-ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454.scope: Deactivated successfully. Dec 13 03:42:03.951794 systemd[1]: cri-containerd-ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454.scope: Consumed 1.345s CPU time. Dec 13 03:42:03.961000 audit: BPF prog-id=132 op=UNLOAD Dec 13 03:42:04.000276 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 03:42:04.000374 kernel: audit: type=1334 audit(1734061323.961:982): prog-id=132 op=UNLOAD Dec 13 03:42:04.012871 kubelet[2627]: I1213 03:42:04.012831 2627 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 03:42:04.038245 kubelet[2627]: I1213 03:42:04.038227 2627 topology_manager.go:215] "Topology Admit Handler" podUID="8fb664ec-4133-4c36-b6c2-dd46aaa5371c" podNamespace="calico-system" podName="calico-kube-controllers-5cf74b8db4-grhxb" Dec 13 03:42:04.039133 kubelet[2627]: I1213 03:42:04.039112 2627 topology_manager.go:215] "Topology Admit Handler" podUID="ce5f26d1-e972-4383-9242-e216b0d32e0b" podNamespace="calico-apiserver" podName="calico-apiserver-5ccff7d95d-v445p" Dec 13 03:42:04.039664 kubelet[2627]: I1213 03:42:04.039653 2627 topology_manager.go:215] "Topology Admit Handler" podUID="0ddb1973-0266-4808-9fcb-3464d106dc6c" podNamespace="calico-apiserver" podName="calico-apiserver-5ccff7d95d-m6zv5" Dec 13 03:42:04.039914 kubelet[2627]: I1213 03:42:04.039902 2627 topology_manager.go:215] "Topology Admit Handler" podUID="b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2" podNamespace="kube-system" podName="coredns-76f75df574-q2j5v" Dec 13 03:42:04.040332 kubelet[2627]: I1213 03:42:04.040321 2627 topology_manager.go:215] "Topology Admit Handler" podUID="704af507-b78e-4b4f-8cdb-a5ee4c2261b5" podNamespace="kube-system" podName="coredns-76f75df574-mjs96" Dec 13 03:42:04.041733 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454-rootfs.mount: Deactivated successfully. Dec 13 03:42:04.043952 systemd[1]: Created slice kubepods-besteffort-pod8fb664ec_4133_4c36_b6c2_dd46aaa5371c.slice. Dec 13 03:42:04.046116 systemd[1]: Created slice kubepods-besteffort-podce5f26d1_e972_4383_9242_e216b0d32e0b.slice. Dec 13 03:42:04.048289 systemd[1]: Created slice kubepods-besteffort-pod0ddb1973_0266_4808_9fcb_3464d106dc6c.slice. Dec 13 03:42:04.050401 systemd[1]: Created slice kubepods-burstable-podb49175c1_6a0b_40f7_b8d9_fe2f55e3c4a2.slice. Dec 13 03:42:04.052556 systemd[1]: Created slice kubepods-burstable-pod704af507_b78e_4b4f_8cdb_a5ee4c2261b5.slice. Dec 13 03:42:04.127623 kubelet[2627]: I1213 03:42:04.127510 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2-config-volume\") pod \"coredns-76f75df574-q2j5v\" (UID: \"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2\") " pod="kube-system/coredns-76f75df574-q2j5v" Dec 13 03:42:04.129554 kubelet[2627]: I1213 03:42:04.127714 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/704af507-b78e-4b4f-8cdb-a5ee4c2261b5-config-volume\") pod \"coredns-76f75df574-mjs96\" (UID: \"704af507-b78e-4b4f-8cdb-a5ee4c2261b5\") " pod="kube-system/coredns-76f75df574-mjs96" Dec 13 03:42:04.129554 kubelet[2627]: I1213 03:42:04.127823 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8fb664ec-4133-4c36-b6c2-dd46aaa5371c-tigera-ca-bundle\") pod \"calico-kube-controllers-5cf74b8db4-grhxb\" (UID: \"8fb664ec-4133-4c36-b6c2-dd46aaa5371c\") " pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" Dec 13 03:42:04.129554 kubelet[2627]: I1213 03:42:04.127932 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4mwgn\" (UniqueName: \"kubernetes.io/projected/8fb664ec-4133-4c36-b6c2-dd46aaa5371c-kube-api-access-4mwgn\") pod \"calico-kube-controllers-5cf74b8db4-grhxb\" (UID: \"8fb664ec-4133-4c36-b6c2-dd46aaa5371c\") " pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" Dec 13 03:42:04.129554 kubelet[2627]: I1213 03:42:04.128039 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kh78v\" (UniqueName: \"kubernetes.io/projected/704af507-b78e-4b4f-8cdb-a5ee4c2261b5-kube-api-access-kh78v\") pod \"coredns-76f75df574-mjs96\" (UID: \"704af507-b78e-4b4f-8cdb-a5ee4c2261b5\") " pod="kube-system/coredns-76f75df574-mjs96" Dec 13 03:42:04.129554 kubelet[2627]: I1213 03:42:04.128122 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvmr9\" (UniqueName: \"kubernetes.io/projected/0ddb1973-0266-4808-9fcb-3464d106dc6c-kube-api-access-rvmr9\") pod \"calico-apiserver-5ccff7d95d-m6zv5\" (UID: \"0ddb1973-0266-4808-9fcb-3464d106dc6c\") " pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" Dec 13 03:42:04.130171 kubelet[2627]: I1213 03:42:04.128223 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9n722\" (UniqueName: \"kubernetes.io/projected/b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2-kube-api-access-9n722\") pod \"coredns-76f75df574-q2j5v\" (UID: \"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2\") " pod="kube-system/coredns-76f75df574-q2j5v" Dec 13 03:42:04.130171 kubelet[2627]: I1213 03:42:04.128390 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mgtxl\" (UniqueName: \"kubernetes.io/projected/ce5f26d1-e972-4383-9242-e216b0d32e0b-kube-api-access-mgtxl\") pod \"calico-apiserver-5ccff7d95d-v445p\" (UID: \"ce5f26d1-e972-4383-9242-e216b0d32e0b\") " pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" Dec 13 03:42:04.130171 kubelet[2627]: I1213 03:42:04.128489 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ce5f26d1-e972-4383-9242-e216b0d32e0b-calico-apiserver-certs\") pod \"calico-apiserver-5ccff7d95d-v445p\" (UID: \"ce5f26d1-e972-4383-9242-e216b0d32e0b\") " pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" Dec 13 03:42:04.130171 kubelet[2627]: I1213 03:42:04.128552 2627 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0ddb1973-0266-4808-9fcb-3464d106dc6c-calico-apiserver-certs\") pod \"calico-apiserver-5ccff7d95d-m6zv5\" (UID: \"0ddb1973-0266-4808-9fcb-3464d106dc6c\") " pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" Dec 13 03:42:04.346094 env[1555]: time="2024-12-13T03:42:04.345960234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cf74b8db4-grhxb,Uid:8fb664ec-4133-4c36-b6c2-dd46aaa5371c,Namespace:calico-system,Attempt:0,}" Dec 13 03:42:04.349065 env[1555]: time="2024-12-13T03:42:04.348948021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-v445p,Uid:ce5f26d1-e972-4383-9242-e216b0d32e0b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 03:42:04.351074 env[1555]: time="2024-12-13T03:42:04.350920997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-m6zv5,Uid:0ddb1973-0266-4808-9fcb-3464d106dc6c,Namespace:calico-apiserver,Attempt:0,}" Dec 13 03:42:04.353139 env[1555]: time="2024-12-13T03:42:04.353058285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q2j5v,Uid:b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2,Namespace:kube-system,Attempt:0,}" Dec 13 03:42:04.355233 env[1555]: time="2024-12-13T03:42:04.355125799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mjs96,Uid:704af507-b78e-4b4f-8cdb-a5ee4c2261b5,Namespace:kube-system,Attempt:0,}" Dec 13 03:42:04.717728 env[1555]: time="2024-12-13T03:42:04.717689813Z" level=info msg="shim disconnected" id=ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454 Dec 13 03:42:04.717728 env[1555]: time="2024-12-13T03:42:04.717726171Z" level=warning msg="cleaning up after shim disconnected" id=ccc76cbe01e99a8d97afbb976eb8a9f11c94582bad2f2fb368ee67276b930454 namespace=k8s.io Dec 13 03:42:04.717882 env[1555]: time="2024-12-13T03:42:04.717736454Z" level=info msg="cleaning up dead shim" Dec 13 03:42:04.724052 env[1555]: time="2024-12-13T03:42:04.723984390Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:42:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3454 runtime=io.containerd.runc.v2\n" Dec 13 03:42:04.739413 env[1555]: time="2024-12-13T03:42:04.739367654Z" level=error msg="Failed to destroy network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.739610 env[1555]: time="2024-12-13T03:42:04.739590132Z" level=error msg="encountered an error cleaning up failed sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.739673 env[1555]: time="2024-12-13T03:42:04.739628143Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-v445p,Uid:ce5f26d1-e972-4383-9242-e216b0d32e0b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.739822 kubelet[2627]: E1213 03:42:04.739810 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.739997 kubelet[2627]: E1213 03:42:04.739850 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" Dec 13 03:42:04.739997 kubelet[2627]: E1213 03:42:04.739866 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" Dec 13 03:42:04.739997 kubelet[2627]: E1213 03:42:04.739905 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5ccff7d95d-v445p_calico-apiserver(ce5f26d1-e972-4383-9242-e216b0d32e0b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5ccff7d95d-v445p_calico-apiserver(ce5f26d1-e972-4383-9242-e216b0d32e0b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" podUID="ce5f26d1-e972-4383-9242-e216b0d32e0b" Dec 13 03:42:04.743861 env[1555]: time="2024-12-13T03:42:04.743824149Z" level=error msg="Failed to destroy network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744059 env[1555]: time="2024-12-13T03:42:04.744041741Z" level=error msg="encountered an error cleaning up failed sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744106 env[1555]: time="2024-12-13T03:42:04.744081171Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cf74b8db4-grhxb,Uid:8fb664ec-4133-4c36-b6c2-dd46aaa5371c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744221 kubelet[2627]: E1213 03:42:04.744208 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744266 kubelet[2627]: E1213 03:42:04.744240 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" Dec 13 03:42:04.744266 kubelet[2627]: E1213 03:42:04.744257 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" Dec 13 03:42:04.744326 kubelet[2627]: E1213 03:42:04.744297 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5cf74b8db4-grhxb_calico-system(8fb664ec-4133-4c36-b6c2-dd46aaa5371c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5cf74b8db4-grhxb_calico-system(8fb664ec-4133-4c36-b6c2-dd46aaa5371c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" podUID="8fb664ec-4133-4c36-b6c2-dd46aaa5371c" Dec 13 03:42:04.744413 env[1555]: time="2024-12-13T03:42:04.744288477Z" level=error msg="Failed to destroy network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744538 env[1555]: time="2024-12-13T03:42:04.744516486Z" level=error msg="encountered an error cleaning up failed sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744583 env[1555]: time="2024-12-13T03:42:04.744549708Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mjs96,Uid:704af507-b78e-4b4f-8cdb-a5ee4c2261b5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744643 kubelet[2627]: E1213 03:42:04.744634 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744676 kubelet[2627]: E1213 03:42:04.744654 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mjs96" Dec 13 03:42:04.744676 kubelet[2627]: E1213 03:42:04.744664 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mjs96" Dec 13 03:42:04.744733 kubelet[2627]: E1213 03:42:04.744692 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-mjs96_kube-system(704af507-b78e-4b4f-8cdb-a5ee4c2261b5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-mjs96_kube-system(704af507-b78e-4b4f-8cdb-a5ee4c2261b5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mjs96" podUID="704af507-b78e-4b4f-8cdb-a5ee4c2261b5" Dec 13 03:42:04.744780 env[1555]: time="2024-12-13T03:42:04.744757251Z" level=error msg="Failed to destroy network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744920 env[1555]: time="2024-12-13T03:42:04.744905985Z" level=error msg="encountered an error cleaning up failed sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.744945 env[1555]: time="2024-12-13T03:42:04.744929318Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q2j5v,Uid:b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745003 kubelet[2627]: E1213 03:42:04.744995 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745033 kubelet[2627]: E1213 03:42:04.745016 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q2j5v" Dec 13 03:42:04.745033 kubelet[2627]: E1213 03:42:04.745028 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q2j5v" Dec 13 03:42:04.745083 kubelet[2627]: E1213 03:42:04.745052 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-q2j5v_kube-system(b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-q2j5v_kube-system(b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q2j5v" podUID="b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2" Dec 13 03:42:04.745127 env[1555]: time="2024-12-13T03:42:04.745059318Z" level=error msg="Failed to destroy network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745216 env[1555]: time="2024-12-13T03:42:04.745202048Z" level=error msg="encountered an error cleaning up failed sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745238 env[1555]: time="2024-12-13T03:42:04.745223910Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-m6zv5,Uid:0ddb1973-0266-4808-9fcb-3464d106dc6c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745300 kubelet[2627]: E1213 03:42:04.745292 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:04.745328 kubelet[2627]: E1213 03:42:04.745311 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" Dec 13 03:42:04.745328 kubelet[2627]: E1213 03:42:04.745321 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" Dec 13 03:42:04.745396 kubelet[2627]: E1213 03:42:04.745351 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5ccff7d95d-m6zv5_calico-apiserver(0ddb1973-0266-4808-9fcb-3464d106dc6c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5ccff7d95d-m6zv5_calico-apiserver(0ddb1973-0266-4808-9fcb-3464d106dc6c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" podUID="0ddb1973-0266-4808-9fcb-3464d106dc6c" Dec 13 03:42:05.259246 systemd[1]: Created slice kubepods-besteffort-pod3407265a_adff_46de_9c22_bac179aa2a85.slice. Dec 13 03:42:05.264603 env[1555]: time="2024-12-13T03:42:05.264486937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l68ds,Uid:3407265a-adff-46de-9c22-bac179aa2a85,Namespace:calico-system,Attempt:0,}" Dec 13 03:42:05.304524 env[1555]: time="2024-12-13T03:42:05.304491353Z" level=error msg="Failed to destroy network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.304715 env[1555]: time="2024-12-13T03:42:05.304695811Z" level=error msg="encountered an error cleaning up failed sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.304761 env[1555]: time="2024-12-13T03:42:05.304730480Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l68ds,Uid:3407265a-adff-46de-9c22-bac179aa2a85,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.304904 kubelet[2627]: E1213 03:42:05.304888 2627 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.304942 kubelet[2627]: E1213 03:42:05.304936 2627 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l68ds" Dec 13 03:42:05.304964 kubelet[2627]: E1213 03:42:05.304956 2627 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l68ds" Dec 13 03:42:05.305009 kubelet[2627]: E1213 03:42:05.305002 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-l68ds_calico-system(3407265a-adff-46de-9c22-bac179aa2a85)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-l68ds_calico-system(3407265a-adff-46de-9c22-bac179aa2a85)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:42:05.306088 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314-shm.mount: Deactivated successfully. Dec 13 03:42:05.326319 kubelet[2627]: I1213 03:42:05.326307 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:05.326612 env[1555]: time="2024-12-13T03:42:05.326592628Z" level=info msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" Dec 13 03:42:05.326676 kubelet[2627]: I1213 03:42:05.326661 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:05.326845 env[1555]: time="2024-12-13T03:42:05.326833146Z" level=info msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" Dec 13 03:42:05.327878 kubelet[2627]: I1213 03:42:05.327865 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:05.328067 env[1555]: time="2024-12-13T03:42:05.328046835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 03:42:05.328142 env[1555]: time="2024-12-13T03:42:05.328125876Z" level=info msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" Dec 13 03:42:05.328374 kubelet[2627]: I1213 03:42:05.328364 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:05.328627 env[1555]: time="2024-12-13T03:42:05.328612018Z" level=info msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" Dec 13 03:42:05.328942 kubelet[2627]: I1213 03:42:05.328926 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:05.329240 env[1555]: time="2024-12-13T03:42:05.329221980Z" level=info msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" Dec 13 03:42:05.329518 kubelet[2627]: I1213 03:42:05.329502 2627 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:05.329898 env[1555]: time="2024-12-13T03:42:05.329869710Z" level=info msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" Dec 13 03:42:05.346138 env[1555]: time="2024-12-13T03:42:05.346104080Z" level=error msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" failed" error="failed to destroy network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.346434 env[1555]: time="2024-12-13T03:42:05.346096144Z" level=error msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" failed" error="failed to destroy network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.346469 kubelet[2627]: E1213 03:42:05.346255 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:05.346469 kubelet[2627]: E1213 03:42:05.346311 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314"} Dec 13 03:42:05.346469 kubelet[2627]: E1213 03:42:05.346255 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:05.346469 kubelet[2627]: E1213 03:42:05.346352 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3407265a-adff-46de-9c22-bac179aa2a85\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.346469 kubelet[2627]: E1213 03:42:05.346364 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408"} Dec 13 03:42:05.346634 kubelet[2627]: E1213 03:42:05.346382 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3407265a-adff-46de-9c22-bac179aa2a85\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l68ds" podUID="3407265a-adff-46de-9c22-bac179aa2a85" Dec 13 03:42:05.346634 kubelet[2627]: E1213 03:42:05.346394 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8fb664ec-4133-4c36-b6c2-dd46aaa5371c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.346634 kubelet[2627]: E1213 03:42:05.346412 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8fb664ec-4133-4c36-b6c2-dd46aaa5371c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" podUID="8fb664ec-4133-4c36-b6c2-dd46aaa5371c" Dec 13 03:42:05.346845 env[1555]: time="2024-12-13T03:42:05.346798533Z" level=error msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" failed" error="failed to destroy network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.346946 kubelet[2627]: E1213 03:42:05.346901 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:05.346946 kubelet[2627]: E1213 03:42:05.346916 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a"} Dec 13 03:42:05.346946 kubelet[2627]: E1213 03:42:05.346936 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ce5f26d1-e972-4383-9242-e216b0d32e0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.347048 kubelet[2627]: E1213 03:42:05.346959 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ce5f26d1-e972-4383-9242-e216b0d32e0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" podUID="ce5f26d1-e972-4383-9242-e216b0d32e0b" Dec 13 03:42:05.347091 env[1555]: time="2024-12-13T03:42:05.346957853Z" level=error msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" failed" error="failed to destroy network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.347118 kubelet[2627]: E1213 03:42:05.347051 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:05.347118 kubelet[2627]: E1213 03:42:05.347067 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6"} Dec 13 03:42:05.347118 kubelet[2627]: E1213 03:42:05.347096 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0ddb1973-0266-4808-9fcb-3464d106dc6c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.347205 kubelet[2627]: E1213 03:42:05.347119 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0ddb1973-0266-4808-9fcb-3464d106dc6c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" podUID="0ddb1973-0266-4808-9fcb-3464d106dc6c" Dec 13 03:42:05.347650 env[1555]: time="2024-12-13T03:42:05.347630414Z" level=error msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" failed" error="failed to destroy network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.347732 kubelet[2627]: E1213 03:42:05.347722 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:05.347786 kubelet[2627]: E1213 03:42:05.347741 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb"} Dec 13 03:42:05.347786 kubelet[2627]: E1213 03:42:05.347773 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"704af507-b78e-4b4f-8cdb-a5ee4c2261b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.347922 env[1555]: time="2024-12-13T03:42:05.347740458Z" level=error msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" failed" error="failed to destroy network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:42:05.347952 kubelet[2627]: E1213 03:42:05.347807 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"704af507-b78e-4b4f-8cdb-a5ee4c2261b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mjs96" podUID="704af507-b78e-4b4f-8cdb-a5ee4c2261b5" Dec 13 03:42:05.347952 kubelet[2627]: E1213 03:42:05.347846 2627 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:05.347952 kubelet[2627]: E1213 03:42:05.347859 2627 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218"} Dec 13 03:42:05.347952 kubelet[2627]: E1213 03:42:05.347880 2627 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:42:05.348075 kubelet[2627]: E1213 03:42:05.347895 2627 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q2j5v" podUID="b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2" Dec 13 03:42:06.102000 audit[3296]: USER_AUTH pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:06.193542 kernel: audit: type=1100 audit(1734061326.102:983): pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:07.918238 sshd[3296]: Failed password for root from 218.92.0.223 port 17066 ssh2 Dec 13 03:42:08.334552 sshd[3296]: Received disconnect from 218.92.0.223 port 17066:11: [preauth] Dec 13 03:42:08.334552 sshd[3296]: Disconnected from authenticating user root 218.92.0.223 port 17066 [preauth] Dec 13 03:42:08.334804 sshd[3296]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:42:08.335735 systemd[1]: sshd@9-147.75.202.177:22-218.92.0.223:17066.service: Deactivated successfully. Dec 13 03:42:08.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.202.177:22-218.92.0.223:17066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:08.426428 kernel: audit: type=1131 audit(1734061328.335:984): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.202.177:22-218.92.0.223:17066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:08.513203 systemd[1]: Started sshd@10-147.75.202.177:22-218.92.0.223:16198.service. Dec 13 03:42:08.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.202.177:22-218.92.0.223:16198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:08.603391 kernel: audit: type=1130 audit(1734061328.513:985): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.202.177:22-218.92.0.223:16198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:09.665468 sshd[3892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:42:09.665000 audit[3892]: USER_AUTH pid=3892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:09.756421 kernel: audit: type=1100 audit(1734061329.665:986): pid=3892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:11.816989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount472773120.mount: Deactivated successfully. Dec 13 03:42:11.838856 env[1555]: time="2024-12-13T03:42:11.838807156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:11.839502 env[1555]: time="2024-12-13T03:42:11.839468027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:11.840050 env[1555]: time="2024-12-13T03:42:11.840036367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:11.840689 env[1555]: time="2024-12-13T03:42:11.840634733Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:11.840977 env[1555]: time="2024-12-13T03:42:11.840934149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 03:42:11.845787 env[1555]: time="2024-12-13T03:42:11.845753196Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:42:11.851291 env[1555]: time="2024-12-13T03:42:11.851273199Z" level=info msg="CreateContainer within sandbox \"0d38d44b6d027bde23b93946c978259ef452f86dc5d80b543b76423b6dce4f30\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"74d3a959028215a90876fd319c7e87985c3fb9d9d893b1e75ec90bede801a229\"" Dec 13 03:42:11.851587 env[1555]: time="2024-12-13T03:42:11.851572316Z" level=info msg="StartContainer for \"74d3a959028215a90876fd319c7e87985c3fb9d9d893b1e75ec90bede801a229\"" Dec 13 03:42:11.860322 systemd[1]: Started cri-containerd-74d3a959028215a90876fd319c7e87985c3fb9d9d893b1e75ec90bede801a229.scope. Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.891438 sshd[3892]: Failed password for root from 218.92.0.223 port 16198 ssh2 Dec 13 03:42:11.869000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b30f640a8 items=0 ppid=3189 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:12.029215 kernel: audit: type=1400 audit(1734061331.869:987): avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.029249 kernel: audit: type=1300 audit(1734061331.869:987): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b30f640a8 items=0 ppid=3189 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:12.029277 kernel: audit: type=1327 audit(1734061331.869:987): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643361393539303238323135613930383736666433313963376538 Dec 13 03:42:11.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643361393539303238323135613930383736666433313963376538 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184440 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184470 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.247361 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.310414 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.374592 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.387487 env[1555]: time="2024-12-13T03:42:12.387458882Z" level=info msg="StartContainer for \"74d3a959028215a90876fd319c7e87985c3fb9d9d893b1e75ec90bede801a229\" returns successfully" Dec 13 03:42:12.439606 kernel: audit: type=1400 audit(1734061331.869:988): avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:11.869000 audit: BPF prog-id=133 op=LOAD Dec 13 03:42:11.869000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f91a8 items=0 ppid=3189 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:11.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643361393539303238323135613930383736666433313963376538 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.028000 audit: BPF prog-id=134 op=LOAD Dec 13 03:42:12.028000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f91f8 items=0 ppid=3189 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:12.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643361393539303238323135613930383736666433313963376538 Dec 13 03:42:12.184000 audit: BPF prog-id=134 op=UNLOAD Dec 13 03:42:12.184000 audit: BPF prog-id=133 op=UNLOAD Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:12.184000 audit: BPF prog-id=135 op=LOAD Dec 13 03:42:12.184000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9288 items=0 ppid=3189 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:12.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643361393539303238323135613930383736666433313963376538 Dec 13 03:42:12.587508 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 03:42:12.587546 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 03:42:13.370377 kubelet[2627]: I1213 03:42:13.370357 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-qp4nk" podStartSLOduration=2.394247295 podStartE2EDuration="20.37032657s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:41:53.865088183 +0000 UTC m=+18.745677686" lastFinishedPulling="2024-12-13 03:42:11.841167456 +0000 UTC m=+36.721756961" observedRunningTime="2024-12-13 03:42:13.369922078 +0000 UTC m=+38.250511585" watchObservedRunningTime="2024-12-13 03:42:13.37032657 +0000 UTC m=+38.250916074" Dec 13 03:42:13.785000 audit[4051]: AVC avc: denied { write } for pid=4051 comm="tee" name="fd" dev="proc" ino=42048 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4051]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf5213a15 a2=241 a3=1b6 items=1 ppid=4021 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=39186 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.785000 audit[4059]: AVC avc: denied { write } for pid=4059 comm="tee" name="fd" dev="proc" ino=40238 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4059]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda7048a05 a2=241 a3=1b6 items=1 ppid=4023 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=40235 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.785000 audit[4060]: AVC avc: denied { write } for pid=4060 comm="tee" name="fd" dev="proc" ino=33415 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4066]: AVC avc: denied { write } for pid=4066 comm="tee" name="fd" dev="proc" ino=28412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4060]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd18fffa14 a2=241 a3=1b6 items=1 ppid=4024 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=21404 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.785000 audit[4066]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd68076a04 a2=241 a3=1b6 items=1 ppid=4025 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=28409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.785000 audit[4065]: AVC avc: denied { write } for pid=4065 comm="tee" name="fd" dev="proc" ino=41031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4065]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd198aca14 a2=241 a3=1b6 items=1 ppid=4022 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=39187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.785000 audit[4062]: AVC avc: denied { write } for pid=4062 comm="tee" name="fd" dev="proc" ino=21407 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.785000 audit[4062]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4c355a16 a2=241 a3=1b6 items=1 ppid=4020 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.785000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 03:42:13.785000 audit: PATH item=0 name="/dev/fd/63" inode=41028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.786000 audit[4063]: AVC avc: denied { write } for pid=4063 comm="tee" name="fd" dev="proc" ino=34329 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:42:13.786000 audit[4063]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbbae1a14 a2=241 a3=1b6 items=1 ppid=4026 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:13.786000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 03:42:13.786000 audit: PATH item=0 name="/dev/fd/63" inode=30214 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:42:13.786000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:42:13.992000 audit[3892]: ANOM_LOGIN_FAILURES pid=3892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:13.992000 audit[3892]: USER_AUTH pid=3892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:13.992580 sshd[3892]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 03:42:15.213185 kubelet[2627]: I1213 03:42:15.213073 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:15.236000 audit[4201]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:15.263176 kernel: kauditd_printk_skb: 71 callbacks suppressed Dec 13 03:42:15.263220 kernel: audit: type=1325 audit(1734061335.236:1002): table=filter:93 family=2 entries=17 op=nft_register_rule pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:15.236000 audit[4201]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffef1de1470 a2=0 a3=7ffef1de145c items=0 ppid=2869 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:15.417599 kernel: audit: type=1300 audit(1734061335.236:1002): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffef1de1470 a2=0 a3=7ffef1de145c items=0 ppid=2869 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:15.417636 kernel: audit: type=1327 audit(1734061335.236:1002): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:15.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:15.484000 audit[4201]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:15.484000 audit[4201]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffef1de1470 a2=0 a3=7ffef1de145c items=0 ppid=2869 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:15.639733 kernel: audit: type=1325 audit(1734061335.484:1003): table=nat:94 family=2 entries=19 op=nft_register_chain pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:15.639757 kernel: audit: type=1300 audit(1734061335.484:1003): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffef1de1470 a2=0 a3=7ffef1de145c items=0 ppid=2869 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:15.639777 kernel: audit: type=1327 audit(1734061335.484:1003): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:15.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031547 kernel: audit: type=1400 audit(1734061335.903:1004): avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031577 kernel: audit: type=1400 audit(1734061335.903:1004): avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031590 kernel: audit: type=1400 audit(1734061335.903:1004): avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.095640 kernel: audit: type=1400 audit(1734061335.903:1004): avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.103482 sshd[3892]: Failed password for root from 218.92.0.223 port 16198 ssh2 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:15.903000 audit: BPF prog-id=136 op=LOAD Dec 13 03:42:15.903000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9ef351e0 a2=98 a3=3 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:15.903000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.031000 audit: BPF prog-id=136 op=UNLOAD Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.031000 audit: BPF prog-id=137 op=LOAD Dec 13 03:42:16.031000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9ef34fc0 a2=74 a3=540051 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.031000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.159000 audit: BPF prog-id=137 op=UNLOAD Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.159000 audit: BPF prog-id=138 op=LOAD Dec 13 03:42:16.159000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9ef34ff0 a2=94 a3=2 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.159000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.159000 audit: BPF prog-id=138 op=UNLOAD Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit: BPF prog-id=139 op=LOAD Dec 13 03:42:16.239000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9ef34eb0 a2=40 a3=1 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.239000 audit: BPF prog-id=139 op=UNLOAD Dec 13 03:42:16.239000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.239000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9ef34f80 a2=50 a3=7ffe9ef35060 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34ec0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9ef34ef0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9ef34e00 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34f10 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34ef0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34ee0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34f10 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9ef34ef0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9ef34f10 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9ef34ee0 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9ef34f50 a2=28 a3=0 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9ef34d00 a2=50 a3=1 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.245000 audit: BPF prog-id=140 op=LOAD Dec 13 03:42:16.245000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9ef34d00 a2=94 a3=5 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.246000 audit: BPF prog-id=140 op=UNLOAD Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9ef34db0 a2=50 a3=1 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9ef34ed0 a2=4 a3=38 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { confidentiality } for pid=4292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.246000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9ef34f20 a2=94 a3=6 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { confidentiality } for pid=4292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.246000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9ef346d0 a2=94 a3=83 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { perfmon } for pid=4292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { bpf } for pid=4292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.246000 audit[4292]: AVC avc: denied { confidentiality } for pid=4292 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.246000 audit[4292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9ef346d0 a2=94 a3=83 items=0 ppid=4243 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit: BPF prog-id=141 op=LOAD Dec 13 03:42:16.250000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe29b77b0 a2=98 a3=1999999999999999 items=0 ppid=4243 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:42:16.250000 audit: BPF prog-id=141 op=UNLOAD Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit: BPF prog-id=142 op=LOAD Dec 13 03:42:16.250000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe29b7690 a2=74 a3=ffff items=0 ppid=4243 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:42:16.250000 audit: BPF prog-id=142 op=UNLOAD Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.250000 audit: BPF prog-id=143 op=LOAD Dec 13 03:42:16.250000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe29b76d0 a2=40 a3=7fffe29b78b0 items=0 ppid=4243 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:42:16.250000 audit: BPF prog-id=143 op=UNLOAD Dec 13 03:42:16.272897 systemd-networkd[1297]: vxlan.calico: Link UP Dec 13 03:42:16.272901 systemd-networkd[1297]: vxlan.calico: Gained carrier Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=144 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938847a0 a2=98 a3=ffffffff items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit: BPF prog-id=144 op=UNLOAD Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=145 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938845b0 a2=74 a3=540051 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit: BPF prog-id=145 op=UNLOAD Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=146 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938845e0 a2=94 a3=2 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit: BPF prog-id=146 op=UNLOAD Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd938844b0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd938844e0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd938843f0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd93884500 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd938844e0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd938844d0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd93884500 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd938844e0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93884500 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd938844d0 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd93884540 a2=28 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=147 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd938843b0 a2=40 a3=0 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit: BPF prog-id=147 op=UNLOAD Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd938843a0 a2=50 a3=2800 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd938843a0 a2=50 a3=2800 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=148 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd93883bc0 a2=94 a3=2 items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.276000 audit: BPF prog-id=148 op=UNLOAD Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.276000 audit: BPF prog-id=149 op=LOAD Dec 13 03:42:16.276000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd93883cc0 a2=94 a3=2d items=0 ppid=4243 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.276000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.277000 audit: BPF prog-id=150 op=LOAD Dec 13 03:42:16.277000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff38d59ce0 a2=98 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.278000 audit: BPF prog-id=150 op=UNLOAD Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit: BPF prog-id=151 op=LOAD Dec 13 03:42:16.278000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff38d59ac0 a2=74 a3=540051 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.278000 audit: BPF prog-id=151 op=UNLOAD Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.278000 audit: BPF prog-id=152 op=LOAD Dec 13 03:42:16.278000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff38d59af0 a2=94 a3=2 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.278000 audit: BPF prog-id=152 op=UNLOAD Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit: BPF prog-id=153 op=LOAD Dec 13 03:42:16.361000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff38d599b0 a2=40 a3=1 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.361000 audit: BPF prog-id=153 op=UNLOAD Dec 13 03:42:16.361000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.361000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff38d59a80 a2=50 a3=7fff38d59b60 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.361000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d599c0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff38d599f0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff38d59900 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d59a10 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d599f0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d599e0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d59a10 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff38d599f0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff38d59a10 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff38d599e0 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38d59a50 a2=28 a3=0 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff38d59800 a2=50 a3=1 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit: BPF prog-id=154 op=LOAD Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff38d59800 a2=94 a3=5 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit: BPF prog-id=154 op=UNLOAD Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff38d598b0 a2=50 a3=1 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff38d599d0 a2=4 a3=38 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.367000 audit[4333]: AVC avc: denied { confidentiality } for pid=4333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.367000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff38d59a20 a2=94 a3=6 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.367000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { confidentiality } for pid=4333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff38d591d0 a2=94 a3=83 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { confidentiality } for pid=4333 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff38d591d0 a2=94 a3=83 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38d5ac10 a2=10 a3=f1f00800 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38d5aab0 a2=10 a3=3 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38d5aa50 a2=10 a3=3 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.368000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:16.368000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38d5aa50 a2=10 a3=7 items=0 ppid=4243 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.368000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:42:16.376000 audit: BPF prog-id=149 op=UNLOAD Dec 13 03:42:16.410000 audit[4388]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4388 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:16.410000 audit[4388]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffa85cfea0 a2=0 a3=7fffa85cfe8c items=0 ppid=4243 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.410000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:16.413000 audit[4387]: NETFILTER_CFG table=nat:96 family=2 entries=15 op=nft_register_chain pid=4387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:16.413000 audit[4387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd6bef6620 a2=0 a3=7ffd6bef660c items=0 ppid=4243 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.413000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:16.415000 audit[4391]: NETFILTER_CFG table=filter:97 family=2 entries=39 op=nft_register_chain pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:16.415000 audit[4391]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffff1af3ad0 a2=0 a3=7ffff1af3abc items=0 ppid=4243 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.415000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:16.416000 audit[4386]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:16.416000 audit[4386]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd5c9b5010 a2=0 a3=7ffd5c9b4ffc items=0 ppid=4243 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:16.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:17.246272 env[1555]: time="2024-12-13T03:42:17.246167185Z" level=info msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" Dec 13 03:42:17.246272 env[1555]: time="2024-12-13T03:42:17.246181745Z" level=info msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" Dec 13 03:42:17.247523 env[1555]: time="2024-12-13T03:42:17.246445010Z" level=info msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.286 [INFO][4447] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.286 [INFO][4447] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" iface="eth0" netns="/var/run/netns/cni-ddbc592f-426c-2ffa-73c9-c0989e0d885e" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.287 [INFO][4447] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" iface="eth0" netns="/var/run/netns/cni-ddbc592f-426c-2ffa-73c9-c0989e0d885e" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.287 [INFO][4447] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" iface="eth0" netns="/var/run/netns/cni-ddbc592f-426c-2ffa-73c9-c0989e0d885e" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.287 [INFO][4447] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.287 [INFO][4447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.297 [INFO][4493] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.297 [INFO][4493] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.297 [INFO][4493] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.301 [WARNING][4493] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.301 [INFO][4493] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.302 [INFO][4493] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.304601 env[1555]: 2024-12-13 03:42:17.303 [INFO][4447] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:17.304932 env[1555]: time="2024-12-13T03:42:17.304677288Z" level=info msg="TearDown network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" successfully" Dec 13 03:42:17.304932 env[1555]: time="2024-12-13T03:42:17.304697491Z" level=info msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" returns successfully" Dec 13 03:42:17.305200 env[1555]: time="2024-12-13T03:42:17.305183047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-v445p,Uid:ce5f26d1-e972-4383-9242-e216b0d32e0b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 03:42:17.306624 systemd[1]: run-netns-cni\x2dddbc592f\x2d426c\x2d2ffa\x2d73c9\x2dc0989e0d885e.mount: Deactivated successfully. Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" iface="eth0" netns="/var/run/netns/cni-d3159f8b-ef4a-ea70-aa94-1c09d87a26ec" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" iface="eth0" netns="/var/run/netns/cni-d3159f8b-ef4a-ea70-aa94-1c09d87a26ec" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" iface="eth0" netns="/var/run/netns/cni-d3159f8b-ef4a-ea70-aa94-1c09d87a26ec" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.287 [INFO][4446] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.297 [INFO][4495] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.297 [INFO][4495] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.302 [INFO][4495] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.306 [WARNING][4495] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.306 [INFO][4495] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.307 [INFO][4495] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.309320 env[1555]: 2024-12-13 03:42:17.308 [INFO][4446] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:17.309617 env[1555]: time="2024-12-13T03:42:17.309393738Z" level=info msg="TearDown network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" successfully" Dec 13 03:42:17.309617 env[1555]: time="2024-12-13T03:42:17.309410861Z" level=info msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" returns successfully" Dec 13 03:42:17.309764 env[1555]: time="2024-12-13T03:42:17.309752131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q2j5v,Uid:b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2,Namespace:kube-system,Attempt:1,}" Dec 13 03:42:17.311421 systemd[1]: run-netns-cni\x2dd3159f8b\x2def4a\x2dea70\x2daa94\x2d1c09d87a26ec.mount: Deactivated successfully. Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" iface="eth0" netns="/var/run/netns/cni-da0909c6-8ef0-19ae-748d-8ac7101dd556" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" iface="eth0" netns="/var/run/netns/cni-da0909c6-8ef0-19ae-748d-8ac7101dd556" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" iface="eth0" netns="/var/run/netns/cni-da0909c6-8ef0-19ae-748d-8ac7101dd556" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.287 [INFO][4445] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.297 [INFO][4494] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.297 [INFO][4494] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.307 [INFO][4494] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.311 [WARNING][4494] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.311 [INFO][4494] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.312 [INFO][4494] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.314502 env[1555]: 2024-12-13 03:42:17.313 [INFO][4445] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:17.314821 env[1555]: time="2024-12-13T03:42:17.314557722Z" level=info msg="TearDown network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" successfully" Dec 13 03:42:17.314821 env[1555]: time="2024-12-13T03:42:17.314575588Z" level=info msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" returns successfully" Dec 13 03:42:17.314961 env[1555]: time="2024-12-13T03:42:17.314944640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cf74b8db4-grhxb,Uid:8fb664ec-4133-4c36-b6c2-dd46aaa5371c,Namespace:calico-system,Attempt:1,}" Dec 13 03:42:17.317795 systemd[1]: run-netns-cni\x2dda0909c6\x2d8ef0\x2d19ae\x2d748d\x2d8ac7101dd556.mount: Deactivated successfully. Dec 13 03:42:17.369327 systemd-networkd[1297]: cali57efdb08da8: Link UP Dec 13 03:42:17.425373 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:42:17.425453 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali57efdb08da8: link becomes ready Dec 13 03:42:17.425508 systemd-networkd[1297]: cali57efdb08da8: Gained carrier Dec 13 03:42:17.427815 systemd-networkd[1297]: cali0034b28f1d5: Link UP Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.331 [INFO][4532] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0 calico-apiserver-5ccff7d95d- calico-apiserver ce5f26d1-e972-4383-9242-e216b0d32e0b 772 0 2024-12-13 03:41:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5ccff7d95d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 calico-apiserver-5ccff7d95d-v445p eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali57efdb08da8 [] []}} ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.331 [INFO][4532] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.345 [INFO][4596] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" HandleID="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.351 [INFO][4596] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" HandleID="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000513c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"calico-apiserver-5ccff7d95d-v445p", "timestamp":"2024-12-13 03:42:17.345444066 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.351 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.351 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.351 [INFO][4596] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.352 [INFO][4596] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.355 [INFO][4596] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.358 [INFO][4596] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.359 [INFO][4596] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.360 [INFO][4596] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.360 [INFO][4596] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.362 [INFO][4596] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.364 [INFO][4596] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.367 [INFO][4596] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.65/26] block=192.168.127.64/26 handle="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.367 [INFO][4596] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.65/26] handle="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.367 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.431713 env[1555]: 2024-12-13 03:42:17.367 [INFO][4596] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.65/26] IPv6=[] ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" HandleID="k8s-pod-network.f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.368 [INFO][4532] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"ce5f26d1-e972-4383-9242-e216b0d32e0b", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"calico-apiserver-5ccff7d95d-v445p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57efdb08da8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.368 [INFO][4532] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.65/32] ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.368 [INFO][4532] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali57efdb08da8 ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.425 [INFO][4532] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.425 [INFO][4532] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"ce5f26d1-e972-4383-9242-e216b0d32e0b", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d", Pod:"calico-apiserver-5ccff7d95d-v445p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57efdb08da8", MAC:"22:58:1a:2d:5f:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.432146 env[1555]: 2024-12-13 03:42:17.430 [INFO][4532] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-v445p" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:17.436000 audit[4662]: NETFILTER_CFG table=filter:99 family=2 entries=40 op=nft_register_chain pid=4662 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:17.436000 audit[4662]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffce376fea0 a2=0 a3=7ffce376fe8c items=0 ppid=4243 pid=4662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:17.437332 env[1555]: time="2024-12-13T03:42:17.437301101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:17.437332 env[1555]: time="2024-12-13T03:42:17.437325126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:17.437412 env[1555]: time="2024-12-13T03:42:17.437337425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:17.437450 env[1555]: time="2024-12-13T03:42:17.437425619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d pid=4666 runtime=io.containerd.runc.v2 Dec 13 03:42:17.444039 systemd[1]: Started cri-containerd-f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d.scope. Dec 13 03:42:17.456146 systemd-networkd[1297]: cali0034b28f1d5: Gained carrier Dec 13 03:42:17.456346 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0034b28f1d5: link becomes ready Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit: BPF prog-id=155 op=LOAD Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4666 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623832393430633833613536356430376131303361653230306634 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4666 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623832393430633833613536356430376131303361653230306634 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit: BPF prog-id=156 op=LOAD Dec 13 03:42:17.464000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000381d90 items=0 ppid=4666 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623832393430633833613536356430376131303361653230306634 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit: BPF prog-id=157 op=LOAD Dec 13 03:42:17.464000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381dd8 items=0 ppid=4666 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623832393430633833613536356430376131303361653230306634 Dec 13 03:42:17.464000 audit: BPF prog-id=157 op=UNLOAD Dec 13 03:42:17.464000 audit: BPF prog-id=156 op=UNLOAD Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.464000 audit: BPF prog-id=158 op=LOAD Dec 13 03:42:17.464000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f61e8 items=0 ppid=4666 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623832393430633833613536356430376131303361653230306634 Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.333 [INFO][4543] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0 coredns-76f75df574- kube-system b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2 773 0 2024-12-13 03:41:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 coredns-76f75df574-q2j5v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0034b28f1d5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.333 [INFO][4543] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.346 [INFO][4601] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" HandleID="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.352 [INFO][4601] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" HandleID="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000365d00), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"coredns-76f75df574-q2j5v", "timestamp":"2024-12-13 03:42:17.346605258 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.352 [INFO][4601] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.367 [INFO][4601] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.367 [INFO][4601] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.369 [INFO][4601] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.371 [INFO][4601] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.374 [INFO][4601] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.375 [INFO][4601] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.397 [INFO][4601] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.397 [INFO][4601] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.400 [INFO][4601] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.402 [INFO][4601] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.426 [INFO][4601] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.66/26] block=192.168.127.64/26 handle="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.426 [INFO][4601] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.66/26] handle="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.426 [INFO][4601] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.474139 env[1555]: 2024-12-13 03:42:17.426 [INFO][4601] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.66/26] IPv6=[] ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" HandleID="k8s-pod-network.d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.427 [INFO][4543] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"coredns-76f75df574-q2j5v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0034b28f1d5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.427 [INFO][4543] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.66/32] ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.427 [INFO][4543] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0034b28f1d5 ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.456 [INFO][4543] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.456 [INFO][4543] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d", Pod:"coredns-76f75df574-q2j5v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0034b28f1d5", MAC:"e2:15:a1:07:d9:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.474611 env[1555]: 2024-12-13 03:42:17.473 [INFO][4543] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d" Namespace="kube-system" Pod="coredns-76f75df574-q2j5v" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:17.480046 env[1555]: time="2024-12-13T03:42:17.480006630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:17.480046 env[1555]: time="2024-12-13T03:42:17.480028994Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:17.480046 env[1555]: time="2024-12-13T03:42:17.480039239Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:17.479000 audit[4713]: NETFILTER_CFG table=filter:100 family=2 entries=38 op=nft_register_chain pid=4713 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:17.479000 audit[4713]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd4a902b00 a2=0 a3=7ffd4a902aec items=0 ppid=4243 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.479000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:17.480376 env[1555]: time="2024-12-13T03:42:17.480109322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d pid=4716 runtime=io.containerd.runc.v2 Dec 13 03:42:17.481143 env[1555]: time="2024-12-13T03:42:17.481121752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-v445p,Uid:ce5f26d1-e972-4383-9242-e216b0d32e0b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d\"" Dec 13 03:42:17.482007 env[1555]: time="2024-12-13T03:42:17.481987531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 03:42:17.485994 systemd[1]: Started cri-containerd-d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d.scope. Dec 13 03:42:17.487593 systemd-networkd[1297]: calid86e34adcfa: Link UP Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit: BPF prog-id=159 op=LOAD Dec 13 03:42:17.515365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid86e34adcfa: link becomes ready Dec 13 03:42:17.515444 systemd-networkd[1297]: calid86e34adcfa: Gained carrier Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4716 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383332346365346132336364353662313865393533323834366663 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4716 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383332346365346132336364353662313865393533323834366663 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit: BPF prog-id=160 op=LOAD Dec 13 03:42:17.515000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001dbae0 items=0 ppid=4716 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383332346365346132336364353662313865393533323834366663 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit: BPF prog-id=161 op=LOAD Dec 13 03:42:17.515000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001dbb28 items=0 ppid=4716 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383332346365346132336364353662313865393533323834366663 Dec 13 03:42:17.515000 audit: BPF prog-id=161 op=UNLOAD Dec 13 03:42:17.515000 audit: BPF prog-id=160 op=UNLOAD Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.515000 audit: BPF prog-id=162 op=LOAD Dec 13 03:42:17.515000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001dbf38 items=0 ppid=4716 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383332346365346132336364353662313865393533323834366663 Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.334 [INFO][4562] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0 calico-kube-controllers-5cf74b8db4- calico-system 8fb664ec-4133-4c36-b6c2-dd46aaa5371c 774 0 2024-12-13 03:41:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5cf74b8db4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 calico-kube-controllers-5cf74b8db4-grhxb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid86e34adcfa [] []}} ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.334 [INFO][4562] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.347 [INFO][4606] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" HandleID="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.352 [INFO][4606] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" HandleID="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000305a90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"calico-kube-controllers-5cf74b8db4-grhxb", "timestamp":"2024-12-13 03:42:17.347709529 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.352 [INFO][4606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.426 [INFO][4606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.426 [INFO][4606] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.427 [INFO][4606] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.458 [INFO][4606] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.473 [INFO][4606] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.475 [INFO][4606] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.476 [INFO][4606] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.476 [INFO][4606] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.478 [INFO][4606] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4 Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.481 [INFO][4606] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.485 [INFO][4606] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.67/26] block=192.168.127.64/26 handle="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.485 [INFO][4606] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.67/26] handle="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.485 [INFO][4606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:17.523158 env[1555]: 2024-12-13 03:42:17.485 [INFO][4606] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.67/26] IPv6=[] ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" HandleID="k8s-pod-network.51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.486 [INFO][4562] cni-plugin/k8s.go 386: Populated endpoint ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0", GenerateName:"calico-kube-controllers-5cf74b8db4-", Namespace:"calico-system", SelfLink:"", UID:"8fb664ec-4133-4c36-b6c2-dd46aaa5371c", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cf74b8db4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"calico-kube-controllers-5cf74b8db4-grhxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid86e34adcfa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.486 [INFO][4562] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.67/32] ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.486 [INFO][4562] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid86e34adcfa ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.515 [INFO][4562] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.515 [INFO][4562] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0", GenerateName:"calico-kube-controllers-5cf74b8db4-", Namespace:"calico-system", SelfLink:"", UID:"8fb664ec-4133-4c36-b6c2-dd46aaa5371c", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cf74b8db4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4", Pod:"calico-kube-controllers-5cf74b8db4-grhxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid86e34adcfa", MAC:"f2:46:b4:70:ab:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:17.523854 env[1555]: 2024-12-13 03:42:17.522 [INFO][4562] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4" Namespace="calico-system" Pod="calico-kube-controllers-5cf74b8db4-grhxb" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:17.528000 audit[4763]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=4763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:17.528000 audit[4763]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffebb781ce0 a2=0 a3=7ffebb781ccc items=0 ppid=4243 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.528000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:17.529180 env[1555]: time="2024-12-13T03:42:17.529156028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:17.529180 env[1555]: time="2024-12-13T03:42:17.529175715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:17.529260 env[1555]: time="2024-12-13T03:42:17.529182475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:17.529286 env[1555]: time="2024-12-13T03:42:17.529259728Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4 pid=4766 runtime=io.containerd.runc.v2 Dec 13 03:42:17.532430 env[1555]: time="2024-12-13T03:42:17.532404797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q2j5v,Uid:b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2,Namespace:kube-system,Attempt:1,} returns sandbox id \"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d\"" Dec 13 03:42:17.533923 env[1555]: time="2024-12-13T03:42:17.533897189Z" level=info msg="CreateContainer within sandbox \"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 03:42:17.534765 systemd[1]: Started cri-containerd-51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4.scope. Dec 13 03:42:17.539029 env[1555]: time="2024-12-13T03:42:17.538970035Z" level=info msg="CreateContainer within sandbox \"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"822b8243c553deaf73c71d6105377c90e76827b2c7b38b1a1018c8fec9f61238\"" Dec 13 03:42:17.539264 env[1555]: time="2024-12-13T03:42:17.539251042Z" level=info msg="StartContainer for \"822b8243c553deaf73c71d6105377c90e76827b2c7b38b1a1018c8fec9f61238\"" Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit: BPF prog-id=163 op=LOAD Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4766 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531343939363033643137653964643039643337613762663065653562 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4766 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531343939363033643137653964643039643337613762663065653562 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit: BPF prog-id=164 op=LOAD Dec 13 03:42:17.541000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000279d90 items=0 ppid=4766 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531343939363033643137653964643039643337613762663065653562 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.541000 audit: BPF prog-id=165 op=LOAD Dec 13 03:42:17.541000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000279dd8 items=0 ppid=4766 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531343939363033643137653964643039643337613762663065653562 Dec 13 03:42:17.542000 audit: BPF prog-id=165 op=UNLOAD Dec 13 03:42:17.542000 audit: BPF prog-id=164 op=UNLOAD Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.542000 audit: BPF prog-id=166 op=LOAD Dec 13 03:42:17.542000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f01e8 items=0 ppid=4766 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531343939363033643137653964643039643337613762663065653562 Dec 13 03:42:17.546622 systemd[1]: Started cri-containerd-822b8243c553deaf73c71d6105377c90e76827b2c7b38b1a1018c8fec9f61238.scope. Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.552000 audit: BPF prog-id=167 op=LOAD Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4716 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326238323433633535336465616637336337316436313035333737 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4716 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326238323433633535336465616637336337316436313035333737 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit: BPF prog-id=168 op=LOAD Dec 13 03:42:17.553000 audit[4806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000261d40 items=0 ppid=4716 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326238323433633535336465616637336337316436313035333737 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit: BPF prog-id=169 op=LOAD Dec 13 03:42:17.553000 audit[4806]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000261d88 items=0 ppid=4716 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326238323433633535336465616637336337316436313035333737 Dec 13 03:42:17.553000 audit: BPF prog-id=169 op=UNLOAD Dec 13 03:42:17.553000 audit: BPF prog-id=168 op=UNLOAD Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:17.553000 audit: BPF prog-id=170 op=LOAD Dec 13 03:42:17.553000 audit[4806]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ba198 items=0 ppid=4716 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:17.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832326238323433633535336465616637336337316436313035333737 Dec 13 03:42:17.559442 env[1555]: time="2024-12-13T03:42:17.559419917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cf74b8db4-grhxb,Uid:8fb664ec-4133-4c36-b6c2-dd46aaa5371c,Namespace:calico-system,Attempt:1,} returns sandbox id \"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4\"" Dec 13 03:42:17.559565 env[1555]: time="2024-12-13T03:42:17.559550320Z" level=info msg="StartContainer for \"822b8243c553deaf73c71d6105377c90e76827b2c7b38b1a1018c8fec9f61238\" returns successfully" Dec 13 03:42:18.185670 systemd-networkd[1297]: vxlan.calico: Gained IPv6LL Dec 13 03:42:18.245573 env[1555]: time="2024-12-13T03:42:18.245480286Z" level=info msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.284 [INFO][4874] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.284 [INFO][4874] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" iface="eth0" netns="/var/run/netns/cni-a9538a46-211b-52b0-9d0c-53d8c9b482d7" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.285 [INFO][4874] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" iface="eth0" netns="/var/run/netns/cni-a9538a46-211b-52b0-9d0c-53d8c9b482d7" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.285 [INFO][4874] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" iface="eth0" netns="/var/run/netns/cni-a9538a46-211b-52b0-9d0c-53d8c9b482d7" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.285 [INFO][4874] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.285 [INFO][4874] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.294 [INFO][4886] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.294 [INFO][4886] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.294 [INFO][4886] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.298 [WARNING][4886] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.298 [INFO][4886] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.299 [INFO][4886] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:18.301076 env[1555]: 2024-12-13 03:42:18.300 [INFO][4874] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:18.301568 env[1555]: time="2024-12-13T03:42:18.301117656Z" level=info msg="TearDown network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" successfully" Dec 13 03:42:18.301568 env[1555]: time="2024-12-13T03:42:18.301139786Z" level=info msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" returns successfully" Dec 13 03:42:18.301568 env[1555]: time="2024-12-13T03:42:18.301547888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l68ds,Uid:3407265a-adff-46de-9c22-bac179aa2a85,Namespace:calico-system,Attempt:1,}" Dec 13 03:42:18.309196 systemd[1]: run-netns-cni\x2da9538a46\x2d211b\x2d52b0\x2d9d0c\x2d53d8c9b482d7.mount: Deactivated successfully. Dec 13 03:42:18.317000 audit[3892]: USER_AUTH pid=3892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:18.365081 systemd-networkd[1297]: cali50ae507600f: Link UP Dec 13 03:42:18.367538 kubelet[2627]: I1213 03:42:18.367506 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-q2j5v" podStartSLOduration=31.367467903 podStartE2EDuration="31.367467903s" podCreationTimestamp="2024-12-13 03:41:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:42:18.367118826 +0000 UTC m=+43.247708338" watchObservedRunningTime="2024-12-13 03:42:18.367467903 +0000 UTC m=+43.248057410" Dec 13 03:42:18.392437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50ae507600f: link becomes ready Dec 13 03:42:18.392700 systemd-networkd[1297]: cali50ae507600f: Gained carrier Dec 13 03:42:18.395000 audit[4938]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:18.395000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffefeefdc60 a2=0 a3=7ffefeefdc4c items=0 ppid=2869 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.322 [INFO][4903] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0 csi-node-driver- calico-system 3407265a-adff-46de-9c22-bac179aa2a85 791 0 2024-12-13 03:41:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 csi-node-driver-l68ds eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali50ae507600f [] []}} ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.322 [INFO][4903] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.338 [INFO][4922] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" HandleID="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.344 [INFO][4922] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" HandleID="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000122730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"csi-node-driver-l68ds", "timestamp":"2024-12-13 03:42:18.338360405 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.344 [INFO][4922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.344 [INFO][4922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.344 [INFO][4922] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.345 [INFO][4922] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.349 [INFO][4922] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.352 [INFO][4922] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.353 [INFO][4922] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.355 [INFO][4922] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.355 [INFO][4922] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.356 [INFO][4922] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.359 [INFO][4922] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.362 [INFO][4922] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.68/26] block=192.168.127.64/26 handle="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.363 [INFO][4922] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.68/26] handle="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.363 [INFO][4922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:18.398468 env[1555]: 2024-12-13 03:42:18.363 [INFO][4922] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.68/26] IPv6=[] ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" HandleID="k8s-pod-network.9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.364 [INFO][4903] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3407265a-adff-46de-9c22-bac179aa2a85", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"csi-node-driver-l68ds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali50ae507600f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.364 [INFO][4903] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.68/32] ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.364 [INFO][4903] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali50ae507600f ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.392 [INFO][4903] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.392 [INFO][4903] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3407265a-adff-46de-9c22-bac179aa2a85", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d", Pod:"csi-node-driver-l68ds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali50ae507600f", MAC:"9a:35:5d:22:79:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:18.398895 env[1555]: 2024-12-13 03:42:18.397 [INFO][4903] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d" Namespace="calico-system" Pod="csi-node-driver-l68ds" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:18.403745 env[1555]: time="2024-12-13T03:42:18.403710233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:18.403745 env[1555]: time="2024-12-13T03:42:18.403734085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:18.403873 env[1555]: time="2024-12-13T03:42:18.403745146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:18.403926 env[1555]: time="2024-12-13T03:42:18.403909061Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d pid=4958 runtime=io.containerd.runc.v2 Dec 13 03:42:18.405000 audit[4938]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:18.405000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffefeefdc60 a2=0 a3=0 items=0 ppid=2869 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:18.410503 systemd[1]: Started cri-containerd-9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d.scope. Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit: BPF prog-id=171 op=LOAD Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4958 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964383731383761613266303865326636346530643432343064383137 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4958 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964383731383761613266303865326636346530643432343064383137 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit: BPF prog-id=172 op=LOAD Dec 13 03:42:18.414000 audit[4967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284ec0 items=0 ppid=4958 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964383731383761613266303865326636346530643432343064383137 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.414000 audit: BPF prog-id=173 op=LOAD Dec 13 03:42:18.414000 audit[4967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284f08 items=0 ppid=4958 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964383731383761613266303865326636346530643432343064383137 Dec 13 03:42:18.415000 audit: BPF prog-id=173 op=UNLOAD Dec 13 03:42:18.415000 audit: BPF prog-id=172 op=UNLOAD Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:18.415000 audit: BPF prog-id=174 op=LOAD Dec 13 03:42:18.415000 audit[4967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000285318 items=0 ppid=4958 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964383731383761613266303865326636346530643432343064383137 Dec 13 03:42:18.419576 env[1555]: time="2024-12-13T03:42:18.419552689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l68ds,Uid:3407265a-adff-46de-9c22-bac179aa2a85,Namespace:calico-system,Attempt:1,} returns sandbox id \"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d\"" Dec 13 03:42:18.424000 audit[4991]: NETFILTER_CFG table=filter:104 family=2 entries=48 op=nft_register_chain pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:18.424000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=23868 a0=3 a1=7ffd1d6435c0 a2=0 a3=7ffd1d6435ac items=0 ppid=4243 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.424000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:18.441000 audit[4992]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:18.441000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd05620400 a2=0 a3=7ffd056203ec items=0 ppid=2869 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:18.459000 audit[4992]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:18.459000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd05620400 a2=0 a3=7ffd056203ec items=0 ppid=2869 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:18.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:18.505716 systemd-networkd[1297]: cali0034b28f1d5: Gained IPv6LL Dec 13 03:42:18.569638 systemd-networkd[1297]: calid86e34adcfa: Gained IPv6LL Dec 13 03:42:19.145661 systemd-networkd[1297]: cali57efdb08da8: Gained IPv6LL Dec 13 03:42:19.245745 env[1555]: time="2024-12-13T03:42:19.245614184Z" level=info msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" Dec 13 03:42:19.245963 env[1555]: time="2024-12-13T03:42:19.245744215Z" level=info msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" iface="eth0" netns="/var/run/netns/cni-0664c468-4ec3-a6f8-0d58-0a62732065a9" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" iface="eth0" netns="/var/run/netns/cni-0664c468-4ec3-a6f8-0d58-0a62732065a9" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" iface="eth0" netns="/var/run/netns/cni-0664c468-4ec3-a6f8-0d58-0a62732065a9" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.280 [INFO][5026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.290 [INFO][5058] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.290 [INFO][5058] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.290 [INFO][5058] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.294 [WARNING][5058] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.294 [INFO][5058] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.295 [INFO][5058] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:19.296812 env[1555]: 2024-12-13 03:42:19.296 [INFO][5026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:19.297244 env[1555]: time="2024-12-13T03:42:19.296892283Z" level=info msg="TearDown network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" successfully" Dec 13 03:42:19.297244 env[1555]: time="2024-12-13T03:42:19.296912215Z" level=info msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" returns successfully" Dec 13 03:42:19.297305 env[1555]: time="2024-12-13T03:42:19.297245578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mjs96,Uid:704af507-b78e-4b4f-8cdb-a5ee4c2261b5,Namespace:kube-system,Attempt:1,}" Dec 13 03:42:19.298633 systemd[1]: run-netns-cni\x2d0664c468\x2d4ec3\x2da6f8\x2d0d58\x2d0a62732065a9.mount: Deactivated successfully. Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.280 [INFO][5027] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.280 [INFO][5027] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" iface="eth0" netns="/var/run/netns/cni-bae8f380-82b5-f10c-dae4-68dd92313e95" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.281 [INFO][5027] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" iface="eth0" netns="/var/run/netns/cni-bae8f380-82b5-f10c-dae4-68dd92313e95" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.281 [INFO][5027] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" iface="eth0" netns="/var/run/netns/cni-bae8f380-82b5-f10c-dae4-68dd92313e95" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.281 [INFO][5027] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.281 [INFO][5027] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.290 [INFO][5059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.290 [INFO][5059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.295 [INFO][5059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.298 [WARNING][5059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.298 [INFO][5059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.299 [INFO][5059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:19.301116 env[1555]: 2024-12-13 03:42:19.300 [INFO][5027] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:19.301596 env[1555]: time="2024-12-13T03:42:19.301150217Z" level=info msg="TearDown network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" successfully" Dec 13 03:42:19.301596 env[1555]: time="2024-12-13T03:42:19.301167994Z" level=info msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" returns successfully" Dec 13 03:42:19.301596 env[1555]: time="2024-12-13T03:42:19.301484456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-m6zv5,Uid:0ddb1973-0266-4808-9fcb-3464d106dc6c,Namespace:calico-apiserver,Attempt:1,}" Dec 13 03:42:19.307583 systemd[1]: run-netns-cni\x2dbae8f380\x2d82b5\x2df10c\x2ddae4\x2d68dd92313e95.mount: Deactivated successfully. Dec 13 03:42:19.356199 systemd-networkd[1297]: cali6de8956fd00: Link UP Dec 13 03:42:19.408808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:42:19.408888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6de8956fd00: link becomes ready Dec 13 03:42:19.408898 systemd-networkd[1297]: cali6de8956fd00: Gained carrier Dec 13 03:42:19.409505 systemd-networkd[1297]: cali88c1dd315bc: Link UP Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.317 [INFO][5086] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0 coredns-76f75df574- kube-system 704af507-b78e-4b4f-8cdb-a5ee4c2261b5 808 0 2024-12-13 03:41:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 coredns-76f75df574-mjs96 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6de8956fd00 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.317 [INFO][5086] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.331 [INFO][5133] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" HandleID="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.338 [INFO][5133] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" HandleID="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00059bec0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"coredns-76f75df574-mjs96", "timestamp":"2024-12-13 03:42:19.331804161 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.338 [INFO][5133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.338 [INFO][5133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.338 [INFO][5133] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.339 [INFO][5133] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.342 [INFO][5133] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.345 [INFO][5133] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.346 [INFO][5133] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.348 [INFO][5133] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.348 [INFO][5133] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.349 [INFO][5133] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3 Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.351 [INFO][5133] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.354 [INFO][5133] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.69/26] block=192.168.127.64/26 handle="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.354 [INFO][5133] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.69/26] handle="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.354 [INFO][5133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:19.415636 env[1555]: 2024-12-13 03:42:19.354 [INFO][5133] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.69/26] IPv6=[] ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" HandleID="k8s-pod-network.154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.355 [INFO][5086] cni-plugin/k8s.go 386: Populated endpoint ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"704af507-b78e-4b4f-8cdb-a5ee4c2261b5", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"coredns-76f75df574-mjs96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de8956fd00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.355 [INFO][5086] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.69/32] ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.355 [INFO][5086] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6de8956fd00 ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.408 [INFO][5086] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.409 [INFO][5086] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"704af507-b78e-4b4f-8cdb-a5ee4c2261b5", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3", Pod:"coredns-76f75df574-mjs96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de8956fd00", MAC:"5e:c6:82:c1:0d:e2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:19.416092 env[1555]: 2024-12-13 03:42:19.414 [INFO][5086] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3" Namespace="kube-system" Pod="coredns-76f75df574-mjs96" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:19.421095 env[1555]: time="2024-12-13T03:42:19.421065516Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:19.421095 env[1555]: time="2024-12-13T03:42:19.421085305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:19.421095 env[1555]: time="2024-12-13T03:42:19.421092584Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:19.421217 env[1555]: time="2024-12-13T03:42:19.421161818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3 pid=5193 runtime=io.containerd.runc.v2 Dec 13 03:42:19.421000 audit[5194]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:19.421000 audit[5194]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7ffc8ca75820 a2=0 a3=7ffc8ca7580c items=0 ppid=4243 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:19.429638 systemd[1]: Started cri-containerd-154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3.scope. Dec 13 03:42:19.436328 systemd-networkd[1297]: cali88c1dd315bc: Gained carrier Dec 13 03:42:19.436409 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali88c1dd315bc: link becomes ready Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.321 [INFO][5101] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0 calico-apiserver-5ccff7d95d- calico-apiserver 0ddb1973-0266-4808-9fcb-3464d106dc6c 809 0 2024-12-13 03:41:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5ccff7d95d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-cc0c4ef4b9 calico-apiserver-5ccff7d95d-m6zv5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali88c1dd315bc [] []}} ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.321 [INFO][5101] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.335 [INFO][5142] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" HandleID="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.340 [INFO][5142] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" HandleID="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000503960), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-cc0c4ef4b9", "pod":"calico-apiserver-5ccff7d95d-m6zv5", "timestamp":"2024-12-13 03:42:19.335871055 +0000 UTC"}, Hostname:"ci-3510.3.6-a-cc0c4ef4b9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.340 [INFO][5142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.354 [INFO][5142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.354 [INFO][5142] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-cc0c4ef4b9' Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.355 [INFO][5142] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.358 [INFO][5142] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.361 [INFO][5142] ipam/ipam.go 489: Trying affinity for 192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.362 [INFO][5142] ipam/ipam.go 155: Attempting to load block cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.364 [INFO][5142] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.364 [INFO][5142] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.365 [INFO][5142] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93 Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.367 [INFO][5142] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.373 [INFO][5142] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.127.70/26] block=192.168.127.64/26 handle="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.373 [INFO][5142] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.127.70/26] handle="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" host="ci-3510.3.6-a-cc0c4ef4b9" Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.373 [INFO][5142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:19.442096 env[1555]: 2024-12-13 03:42:19.373 [INFO][5142] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.70/26] IPv6=[] ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" HandleID="k8s-pod-network.a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.374 [INFO][5101] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"0ddb1973-0266-4808-9fcb-3464d106dc6c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"", Pod:"calico-apiserver-5ccff7d95d-m6zv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88c1dd315bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.374 [INFO][5101] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.127.70/32] ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.374 [INFO][5101] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali88c1dd315bc ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.436 [INFO][5101] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.436 [INFO][5101] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"0ddb1973-0266-4808-9fcb-3464d106dc6c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93", Pod:"calico-apiserver-5ccff7d95d-m6zv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88c1dd315bc", MAC:"8a:60:2f:6f:8a:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:19.442579 env[1555]: 2024-12-13 03:42:19.441 [INFO][5101] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93" Namespace="calico-apiserver" Pod="calico-apiserver-5ccff7d95d-m6zv5" WorkloadEndpoint="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit: BPF prog-id=175 op=LOAD Dec 13 03:42:19.443000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.443000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5193 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346538663665336237613965643831323765633432363431663633 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5193 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346538663665336237613965643831323765633432363431663633 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit: BPF prog-id=176 op=LOAD Dec 13 03:42:19.444000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b86f0 items=0 ppid=5193 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346538663665336237613965643831323765633432363431663633 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit: BPF prog-id=177 op=LOAD Dec 13 03:42:19.444000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b8738 items=0 ppid=5193 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346538663665336237613965643831323765633432363431663633 Dec 13 03:42:19.444000 audit: BPF prog-id=177 op=UNLOAD Dec 13 03:42:19.444000 audit: BPF prog-id=176 op=UNLOAD Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { perfmon } for pid=5204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit[5204]: AVC avc: denied { bpf } for pid=5204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.444000 audit: BPF prog-id=178 op=LOAD Dec 13 03:42:19.444000 audit[5204]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b8b48 items=0 ppid=5193 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346538663665336237613965643831323765633432363431663633 Dec 13 03:42:19.452000 audit[5232]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:42:19.452000 audit[5232]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffdbe792c90 a2=0 a3=7ffdbe792c7c items=0 ppid=4243 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:42:19.461405 env[1555]: time="2024-12-13T03:42:19.461352191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mjs96,Uid:704af507-b78e-4b4f-8cdb-a5ee4c2261b5,Namespace:kube-system,Attempt:1,} returns sandbox id \"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3\"" Dec 13 03:42:19.462602 env[1555]: time="2024-12-13T03:42:19.462585519Z" level=info msg="CreateContainer within sandbox \"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 03:42:19.463548 env[1555]: time="2024-12-13T03:42:19.463519893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:42:19.463548 env[1555]: time="2024-12-13T03:42:19.463540693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:42:19.463615 env[1555]: time="2024-12-13T03:42:19.463547610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:42:19.463643 env[1555]: time="2024-12-13T03:42:19.463618221Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93 pid=5246 runtime=io.containerd.runc.v2 Dec 13 03:42:19.467101 env[1555]: time="2024-12-13T03:42:19.467079950Z" level=info msg="CreateContainer within sandbox \"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6907bf2aeb8a1a03c5e8b34b22dd5271302bb3a865335351e7c590eb783d36d6\"" Dec 13 03:42:19.467431 env[1555]: time="2024-12-13T03:42:19.467416408Z" level=info msg="StartContainer for \"6907bf2aeb8a1a03c5e8b34b22dd5271302bb3a865335351e7c590eb783d36d6\"" Dec 13 03:42:19.469779 systemd[1]: Started cri-containerd-a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93.scope. Dec 13 03:42:19.475049 systemd[1]: Started cri-containerd-6907bf2aeb8a1a03c5e8b34b22dd5271302bb3a865335351e7c590eb783d36d6.scope. Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit: BPF prog-id=179 op=LOAD Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373162616431353334633731383863373230343436636136333965 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373162616431353334633731383863373230343436636136333965 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit: BPF prog-id=180 op=LOAD Dec 13 03:42:19.476000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00021b2c0 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373162616431353334633731383863373230343436636136333965 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit: BPF prog-id=181 op=LOAD Dec 13 03:42:19.476000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00021b308 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373162616431353334633731383863373230343436636136333965 Dec 13 03:42:19.476000 audit: BPF prog-id=181 op=UNLOAD Dec 13 03:42:19.476000 audit: BPF prog-id=180 op=UNLOAD Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.476000 audit: BPF prog-id=182 op=LOAD Dec 13 03:42:19.476000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00021b718 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373162616431353334633731383863373230343436636136333965 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit: BPF prog-id=183 op=LOAD Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5193 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639303762663261656238613161303363356538623334623232646435 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5193 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639303762663261656238613161303363356538623334623232646435 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit: BPF prog-id=184 op=LOAD Dec 13 03:42:19.481000 audit[5273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286ea0 items=0 ppid=5193 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639303762663261656238613161303363356538623334623232646435 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit: BPF prog-id=185 op=LOAD Dec 13 03:42:19.481000 audit[5273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286ee8 items=0 ppid=5193 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639303762663261656238613161303363356538623334623232646435 Dec 13 03:42:19.481000 audit: BPF prog-id=185 op=UNLOAD Dec 13 03:42:19.481000 audit: BPF prog-id=184 op=UNLOAD Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { perfmon } for pid=5273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit[5273]: AVC avc: denied { bpf } for pid=5273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:19.481000 audit: BPF prog-id=186 op=LOAD Dec 13 03:42:19.481000 audit[5273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002872f8 items=0 ppid=5193 pid=5273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:19.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639303762663261656238613161303363356538623334623232646435 Dec 13 03:42:19.487833 env[1555]: time="2024-12-13T03:42:19.487807309Z" level=info msg="StartContainer for \"6907bf2aeb8a1a03c5e8b34b22dd5271302bb3a865335351e7c590eb783d36d6\" returns successfully" Dec 13 03:42:19.492969 env[1555]: time="2024-12-13T03:42:19.492944036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ccff7d95d-m6zv5,Uid:0ddb1973-0266-4808-9fcb-3464d106dc6c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93\"" Dec 13 03:42:19.721646 systemd-networkd[1297]: cali50ae507600f: Gained IPv6LL Dec 13 03:42:20.113638 sshd[3892]: Failed password for root from 218.92.0.223 port 16198 ssh2 Dec 13 03:42:20.373101 kubelet[2627]: I1213 03:42:20.373037 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-mjs96" podStartSLOduration=33.373002303 podStartE2EDuration="33.373002303s" podCreationTimestamp="2024-12-13 03:41:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:42:20.372648719 +0000 UTC m=+45.253238225" watchObservedRunningTime="2024-12-13 03:42:20.373002303 +0000 UTC m=+45.253591806" Dec 13 03:42:20.377189 env[1555]: time="2024-12-13T03:42:20.377164290Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:20.377712 env[1555]: time="2024-12-13T03:42:20.377698032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:20.378438 env[1555]: time="2024-12-13T03:42:20.378425407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:20.379221 env[1555]: time="2024-12-13T03:42:20.379207367Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:20.379602 env[1555]: time="2024-12-13T03:42:20.379548231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 03:42:20.379974 env[1555]: time="2024-12-13T03:42:20.379958296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 03:42:20.379000 audit[5332]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:20.380868 env[1555]: time="2024-12-13T03:42:20.380807019Z" level=info msg="CreateContainer within sandbox \"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 03:42:20.404907 kernel: kauditd_printk_skb: 963 callbacks suppressed Dec 13 03:42:20.404995 kernel: audit: type=1325 audit(1734061340.379:1254): table=filter:109 family=2 entries=10 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:20.379000 audit[5332]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb9393fc0 a2=0 a3=7ffcb9393fac items=0 ppid=2869 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.549704 kernel: audit: type=1300 audit(1734061340.379:1254): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb9393fc0 a2=0 a3=7ffcb9393fac items=0 ppid=2869 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.549739 kernel: audit: type=1327 audit(1734061340.379:1254): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:20.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:20.550957 env[1555]: time="2024-12-13T03:42:20.550914460Z" level=info msg="CreateContainer within sandbox \"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2b9e010550f9db4028e3dc45f4167531644efdf111034ea3a272c8aa14d8d4ae\"" Dec 13 03:42:20.551234 env[1555]: time="2024-12-13T03:42:20.551219065Z" level=info msg="StartContainer for \"2b9e010550f9db4028e3dc45f4167531644efdf111034ea3a272c8aa14d8d4ae\"" Dec 13 03:42:20.560220 systemd[1]: Started cri-containerd-2b9e010550f9db4028e3dc45f4167531644efdf111034ea3a272c8aa14d8d4ae.scope. Dec 13 03:42:20.568667 sshd[3892]: Received disconnect from 218.92.0.223 port 16198:11: [preauth] Dec 13 03:42:20.568667 sshd[3892]: Disconnected from authenticating user root 218.92.0.223 port 16198 [preauth] Dec 13 03:42:20.568793 sshd[3892]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:42:20.569245 systemd[1]: sshd@10-147.75.202.177:22-218.92.0.223:16198.service: Deactivated successfully. Dec 13 03:42:20.602672 kernel: audit: type=1325 audit(1734061340.550:1255): table=nat:110 family=2 entries=44 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:20.550000 audit[5332]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:20.550000 audit[5332]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcb9393fc0 a2=0 a3=7ffcb9393fac items=0 ppid=2869 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.656357 kernel: audit: type=1300 audit(1734061340.550:1255): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcb9393fc0 a2=0 a3=7ffcb9393fac items=0 ppid=2869 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.656295 systemd-networkd[1297]: cali6de8956fd00: Gained IPv6LL Dec 13 03:42:20.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:20.748398 systemd[1]: Started sshd@11-147.75.202.177:22-218.92.0.223:26158.service. Dec 13 03:42:20.799052 kernel: audit: type=1327 audit(1734061340.550:1255): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:20.799086 kernel: audit: type=1131 audit(1734061340.569:1256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.202.177:22-218.92.0.223:16198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:20.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.202.177:22-218.92.0.223:16198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.940018 kernel: audit: type=1400 audit(1734061340.610:1257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.940063 kernel: audit: type=1400 audit(1734061340.610:1258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998985 kernel: audit: type=1400 audit(1734061340.610:1259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.745000 audit: BPF prog-id=187 op=LOAD Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4666 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262396530313035353066396462343032386533646334356634313637 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4666 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262396530313035353066396462343032386533646334356634313637 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.202.177:22-218.92.0.223:26158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:20.746000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.746000 audit: BPF prog-id=188 op=LOAD Dec 13 03:42:20.746000 audit[5340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000398a10 items=0 ppid=4666 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262396530313035353066396462343032386533646334356634313637 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.943000 audit[5362]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=5362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:20.943000 audit[5362]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcbc7557b0 a2=0 a3=7ffcbc75579c items=0 ppid=2869 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:20.880000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.880000 audit: BPF prog-id=189 op=LOAD Dec 13 03:42:20.880000 audit[5340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000398a58 items=0 ppid=4666 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262396530313035353066396462343032386533646334356634313637 Dec 13 03:42:20.998000 audit: BPF prog-id=189 op=UNLOAD Dec 13 03:42:20.998000 audit: BPF prog-id=188 op=UNLOAD Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { perfmon } for pid=5340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit[5340]: AVC avc: denied { bpf } for pid=5340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:20.998000 audit: BPF prog-id=190 op=LOAD Dec 13 03:42:20.998000 audit[5340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000398e68 items=0 ppid=4666 pid=5340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:20.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262396530313035353066396462343032386533646334356634313637 Dec 13 03:42:21.074188 env[1555]: time="2024-12-13T03:42:21.074156597Z" level=info msg="StartContainer for \"2b9e010550f9db4028e3dc45f4167531644efdf111034ea3a272c8aa14d8d4ae\" returns successfully" Dec 13 03:42:21.074000 audit[5362]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=5362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:21.074000 audit[5362]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcbc7557b0 a2=0 a3=7ffcbc75579c items=0 ppid=2869 pid=5362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:21.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:21.193488 systemd-networkd[1297]: cali88c1dd315bc: Gained IPv6LL Dec 13 03:42:21.374487 kubelet[2627]: I1213 03:42:21.374459 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5ccff7d95d-v445p" podStartSLOduration=25.476402604 podStartE2EDuration="28.374414343s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:42:17.481827549 +0000 UTC m=+42.362417055" lastFinishedPulling="2024-12-13 03:42:20.379839288 +0000 UTC m=+45.260428794" observedRunningTime="2024-12-13 03:42:21.3737952 +0000 UTC m=+46.254384707" watchObservedRunningTime="2024-12-13 03:42:21.374414343 +0000 UTC m=+46.255003848" Dec 13 03:42:21.819000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:42:21.819000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001028020 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:42:21.819000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:42:21.892184 sshd[5359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:42:21.892000 audit[5359]: USER_AUTH pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:22.099000 audit[5398]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:22.099000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffefe8cbb50 a2=0 a3=7ffefe8cbb3c items=0 ppid=2869 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:22.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:22.108000 audit[5398]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:22.108000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffefe8cbb50 a2=0 a3=7ffefe8cbb3c items=0 ppid=2869 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:22.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:22.368656 kubelet[2627]: I1213 03:42:22.368564 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:23.182334 env[1555]: time="2024-12-13T03:42:23.182279973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:23.182916 env[1555]: time="2024-12-13T03:42:23.182874930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:23.183500 env[1555]: time="2024-12-13T03:42:23.183461196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:23.184108 env[1555]: time="2024-12-13T03:42:23.184063008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:23.184412 env[1555]: time="2024-12-13T03:42:23.184346933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 03:42:23.184871 env[1555]: time="2024-12-13T03:42:23.184857434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 03:42:23.188811 env[1555]: time="2024-12-13T03:42:23.188760317Z" level=info msg="CreateContainer within sandbox \"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 03:42:23.193415 env[1555]: time="2024-12-13T03:42:23.193383816Z" level=info msg="CreateContainer within sandbox \"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c4f3a74d7053b7ee947c56266a68a0a97673ff63b7e8d8f47f18ee0b24b9140b\"" Dec 13 03:42:23.193808 env[1555]: time="2024-12-13T03:42:23.193767064Z" level=info msg="StartContainer for \"c4f3a74d7053b7ee947c56266a68a0a97673ff63b7e8d8f47f18ee0b24b9140b\"" Dec 13 03:42:23.204310 systemd[1]: Started cri-containerd-c4f3a74d7053b7ee947c56266a68a0a97673ff63b7e8d8f47f18ee0b24b9140b.scope. Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit: BPF prog-id=191 op=LOAD Dec 13 03:42:23.209000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[5408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4766 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663361373464373035336237656539343763353632363661363861 Dec 13 03:42:23.209000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.209000 audit[5408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4766 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663361373464373035336237656539343763353632363661363861 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit: BPF prog-id=192 op=LOAD Dec 13 03:42:23.210000 audit[5408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce020 items=0 ppid=4766 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:23.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663361373464373035336237656539343763353632363661363861 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit: BPF prog-id=193 op=LOAD Dec 13 03:42:23.210000 audit[5408]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce068 items=0 ppid=4766 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:23.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663361373464373035336237656539343763353632363661363861 Dec 13 03:42:23.210000 audit: BPF prog-id=193 op=UNLOAD Dec 13 03:42:23.210000 audit: BPF prog-id=192 op=UNLOAD Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { perfmon } for pid=5408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit[5408]: AVC avc: denied { bpf } for pid=5408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:23.210000 audit: BPF prog-id=194 op=LOAD Dec 13 03:42:23.210000 audit[5408]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce478 items=0 ppid=4766 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:23.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663361373464373035336237656539343763353632363661363861 Dec 13 03:42:23.227977 env[1555]: time="2024-12-13T03:42:23.227951056Z" level=info msg="StartContainer for \"c4f3a74d7053b7ee947c56266a68a0a97673ff63b7e8d8f47f18ee0b24b9140b\" returns successfully" Dec 13 03:42:23.464696 kubelet[2627]: I1213 03:42:23.464672 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5cf74b8db4-grhxb" podStartSLOduration=24.839993613 podStartE2EDuration="30.46463353s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:42:17.559991617 +0000 UTC m=+42.440581122" lastFinishedPulling="2024-12-13 03:42:23.184631532 +0000 UTC m=+48.065221039" observedRunningTime="2024-12-13 03:42:23.396061024 +0000 UTC m=+48.276650615" watchObservedRunningTime="2024-12-13 03:42:23.46463353 +0000 UTC m=+48.345223043" Dec 13 03:42:24.098581 sshd[5359]: Failed password for root from 218.92.0.223 port 26158 ssh2 Dec 13 03:42:24.705518 env[1555]: time="2024-12-13T03:42:24.705461504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:24.706099 env[1555]: time="2024-12-13T03:42:24.706057754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:24.706712 env[1555]: time="2024-12-13T03:42:24.706666946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:24.707879 env[1555]: time="2024-12-13T03:42:24.707850912Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:24.708550 env[1555]: time="2024-12-13T03:42:24.708506970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 03:42:24.708881 env[1555]: time="2024-12-13T03:42:24.708816721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 03:42:24.709676 env[1555]: time="2024-12-13T03:42:24.709627066Z" level=info msg="CreateContainer within sandbox \"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 03:42:24.714721 env[1555]: time="2024-12-13T03:42:24.714676695Z" level=info msg="CreateContainer within sandbox \"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b3b45d52beb2ffe9fd9464bcae498c4d5bfcf87ef74a8aff7fcbd97c0f53230e\"" Dec 13 03:42:24.714998 env[1555]: time="2024-12-13T03:42:24.714984349Z" level=info msg="StartContainer for \"b3b45d52beb2ffe9fd9464bcae498c4d5bfcf87ef74a8aff7fcbd97c0f53230e\"" Dec 13 03:42:24.725110 systemd[1]: Started cri-containerd-b3b45d52beb2ffe9fd9464bcae498c4d5bfcf87ef74a8aff7fcbd97c0f53230e.scope. Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fc0c650e478 items=0 ppid=4958 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:24.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623435643532626562326666653966643934363462636165343938 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit: BPF prog-id=195 op=LOAD Dec 13 03:42:24.731000 audit[5477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000ffeb8 items=0 ppid=4958 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:24.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623435643532626562326666653966643934363462636165343938 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit: BPF prog-id=196 op=LOAD Dec 13 03:42:24.731000 audit[5477]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000fff08 items=0 ppid=4958 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:24.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623435643532626562326666653966643934363462636165343938 Dec 13 03:42:24.731000 audit: BPF prog-id=196 op=UNLOAD Dec 13 03:42:24.731000 audit: BPF prog-id=195 op=UNLOAD Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { perfmon } for pid=5477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit[5477]: AVC avc: denied { bpf } for pid=5477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:24.731000 audit: BPF prog-id=197 op=LOAD Dec 13 03:42:24.731000 audit[5477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000fff98 items=0 ppid=4958 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:24.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623435643532626562326666653966643934363462636165343938 Dec 13 03:42:24.737528 env[1555]: time="2024-12-13T03:42:24.737503254Z" level=info msg="StartContainer for \"b3b45d52beb2ffe9fd9464bcae498c4d5bfcf87ef74a8aff7fcbd97c0f53230e\" returns successfully" Dec 13 03:42:25.085124 env[1555]: time="2024-12-13T03:42:25.084893820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:25.087333 env[1555]: time="2024-12-13T03:42:25.087252066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:25.091063 env[1555]: time="2024-12-13T03:42:25.090961024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:25.094532 env[1555]: time="2024-12-13T03:42:25.094420548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:25.096216 env[1555]: time="2024-12-13T03:42:25.096097833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 03:42:25.097304 env[1555]: time="2024-12-13T03:42:25.097220053Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 03:42:25.100234 env[1555]: time="2024-12-13T03:42:25.100130489Z" level=info msg="CreateContainer within sandbox \"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 03:42:25.112413 env[1555]: time="2024-12-13T03:42:25.112319418Z" level=info msg="CreateContainer within sandbox \"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0e2d63094c73ea45e755a03b5d11538a8e479e555b0481fe0bf227169858b8b2\"" Dec 13 03:42:25.113176 env[1555]: time="2024-12-13T03:42:25.113109878Z" level=info msg="StartContainer for \"0e2d63094c73ea45e755a03b5d11538a8e479e555b0481fe0bf227169858b8b2\"" Dec 13 03:42:25.146325 systemd[1]: Started cri-containerd-0e2d63094c73ea45e755a03b5d11538a8e479e555b0481fe0bf227169858b8b2.scope. Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.166000 audit: BPF prog-id=198 op=LOAD Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5246 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065326436333039346337336561343565373535613033623564313135 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5246 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065326436333039346337336561343565373535613033623564313135 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit: BPF prog-id=199 op=LOAD Dec 13 03:42:25.167000 audit[5512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003048f0 items=0 ppid=5246 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065326436333039346337336561343565373535613033623564313135 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit: BPF prog-id=200 op=LOAD Dec 13 03:42:25.167000 audit[5512]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000304938 items=0 ppid=5246 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065326436333039346337336561343565373535613033623564313135 Dec 13 03:42:25.167000 audit: BPF prog-id=200 op=UNLOAD Dec 13 03:42:25.167000 audit: BPF prog-id=199 op=UNLOAD Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { perfmon } for pid=5512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit[5512]: AVC avc: denied { bpf } for pid=5512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:25.167000 audit: BPF prog-id=201 op=LOAD Dec 13 03:42:25.167000 audit[5512]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000304d48 items=0 ppid=5246 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065326436333039346337336561343565373535613033623564313135 Dec 13 03:42:25.193294 env[1555]: time="2024-12-13T03:42:25.193265106Z" level=info msg="StartContainer for \"0e2d63094c73ea45e755a03b5d11538a8e479e555b0481fe0bf227169858b8b2\" returns successfully" Dec 13 03:42:25.394000 audit[5557]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.418925 kernel: kauditd_printk_skb: 228 callbacks suppressed Dec 13 03:42:25.418961 kernel: audit: type=1325 audit(1734061345.394:1324): table=filter:115 family=2 entries=10 op=nft_register_rule pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.394000 audit[5557]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdb761ba10 a2=0 a3=7ffdb761b9fc items=0 ppid=2869 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.563644 kernel: audit: type=1300 audit(1734061345.394:1324): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdb761ba10 a2=0 a3=7ffdb761b9fc items=0 ppid=2869 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.563720 kernel: audit: type=1327 audit(1734061345.394:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:25.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:25.617000 audit[5557]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.617000 audit[5557]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdb761ba10 a2=0 a3=7ffdb761b9fc items=0 ppid=2869 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.762768 kernel: audit: type=1325 audit(1734061345.617:1325): table=nat:116 family=2 entries=20 op=nft_register_rule pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.762839 kernel: audit: type=1300 audit(1734061345.617:1325): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdb761ba10 a2=0 a3=7ffdb761b9fc items=0 ppid=2869 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.762854 kernel: audit: type=1327 audit(1734061345.617:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:25.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:25.816423 kernel: audit: type=1400 audit(1734061345.742:1326): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:42:25.742000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:42:25.905013 kernel: audit: type=1300 audit(1734061345.742:1326): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f60040 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:42:25.742000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f60040 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:42:25.906280 kubelet[2627]: I1213 03:42:25.906266 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:25.916722 kubelet[2627]: I1213 03:42:25.916696 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5ccff7d95d-m6zv5" podStartSLOduration=27.313574382 podStartE2EDuration="32.916665438s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:42:19.493533806 +0000 UTC m=+44.374123313" lastFinishedPulling="2024-12-13 03:42:25.096624785 +0000 UTC m=+49.977214369" observedRunningTime="2024-12-13 03:42:25.387885805 +0000 UTC m=+50.268475312" watchObservedRunningTime="2024-12-13 03:42:25.916665438 +0000 UTC m=+50.797254941" Dec 13 03:42:25.742000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:42:26.117094 kernel: audit: type=1327 audit(1734061345.742:1326): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:42:26.117138 kernel: audit: type=1325 audit(1734061345.922:1327): table=filter:117 family=2 entries=9 op=nft_register_rule pid=5559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.922000 audit[5559]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=5559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:25.922000 audit[5559]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffee37cf4e0 a2=0 a3=7ffee37cf4cc items=0 ppid=2869 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:25.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:26.184000 audit[5559]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=5559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:26.184000 audit[5559]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffee37cf4e0 a2=0 a3=7ffee37cf4cc items=0 ppid=2869 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:26.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:26.216000 audit[5359]: USER_AUTH pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:26.382685 kubelet[2627]: I1213 03:42:26.382608 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:26.696177 env[1555]: time="2024-12-13T03:42:26.696156398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:26.696805 env[1555]: time="2024-12-13T03:42:26.696791538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:26.697435 env[1555]: time="2024-12-13T03:42:26.697405905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:26.698262 env[1555]: time="2024-12-13T03:42:26.698249269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:42:26.698513 env[1555]: time="2024-12-13T03:42:26.698473129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 03:42:26.699666 env[1555]: time="2024-12-13T03:42:26.699608713Z" level=info msg="CreateContainer within sandbox \"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 03:42:26.704532 env[1555]: time="2024-12-13T03:42:26.704486857Z" level=info msg="CreateContainer within sandbox \"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"738e7cd55c050cda8d520355ebe7172472abebea739492d407b58e62fba24e46\"" Dec 13 03:42:26.704855 env[1555]: time="2024-12-13T03:42:26.704838828Z" level=info msg="StartContainer for \"738e7cd55c050cda8d520355ebe7172472abebea739492d407b58e62fba24e46\"" Dec 13 03:42:26.715957 systemd[1]: Started cri-containerd-738e7cd55c050cda8d520355ebe7172472abebea739492d407b58e62fba24e46.scope. Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f75745a4618 items=0 ppid=4958 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:26.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386537636435356330353063646138643532303335356562653731 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit: BPF prog-id=202 op=LOAD Dec 13 03:42:26.722000 audit[5573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000378418 items=0 ppid=4958 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:26.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386537636435356330353063646138643532303335356562653731 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit: BPF prog-id=203 op=LOAD Dec 13 03:42:26.722000 audit[5573]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000378468 items=0 ppid=4958 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:26.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386537636435356330353063646138643532303335356562653731 Dec 13 03:42:26.722000 audit: BPF prog-id=203 op=UNLOAD Dec 13 03:42:26.722000 audit: BPF prog-id=202 op=UNLOAD Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:42:26.722000 audit: BPF prog-id=204 op=LOAD Dec 13 03:42:26.722000 audit[5573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003784f8 items=0 ppid=4958 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:26.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386537636435356330353063646138643532303335356562653731 Dec 13 03:42:26.729037 env[1555]: time="2024-12-13T03:42:26.729013879Z" level=info msg="StartContainer for \"738e7cd55c050cda8d520355ebe7172472abebea739492d407b58e62fba24e46\" returns successfully" Dec 13 03:42:27.294154 kubelet[2627]: I1213 03:42:27.294101 2627 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 03:42:27.294154 kubelet[2627]: I1213 03:42:27.294130 2627 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 03:42:27.406464 kubelet[2627]: I1213 03:42:27.406445 2627 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-l68ds" podStartSLOduration=26.127807015 podStartE2EDuration="34.406423626s" podCreationTimestamp="2024-12-13 03:41:53 +0000 UTC" firstStartedPulling="2024-12-13 03:42:18.420072646 +0000 UTC m=+43.300662151" lastFinishedPulling="2024-12-13 03:42:26.698689253 +0000 UTC m=+51.579278762" observedRunningTime="2024-12-13 03:42:27.405829371 +0000 UTC m=+52.286418878" watchObservedRunningTime="2024-12-13 03:42:27.406423626 +0000 UTC m=+52.287013130" Dec 13 03:42:28.112515 sshd[5359]: Failed password for root from 218.92.0.223 port 26158 ssh2 Dec 13 03:42:28.467000 audit[5359]: USER_AUTH pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.223 addr=218.92.0.223 terminal=ssh res=failed' Dec 13 03:42:30.264000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.264000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d04330 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:30.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:30.264000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.264000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120e260 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:30.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:30.303618 sshd[5359]: Failed password for root from 218.92.0.223 port 26158 ssh2 Dec 13 03:42:30.460000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.488526 kernel: kauditd_printk_skb: 56 callbacks suppressed Dec 13 03:42:30.488569 kernel: audit: type=1400 audit(1734061350.460:1339): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.460000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c001387620 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.681634 kernel: audit: type=1300 audit(1734061350.460:1339): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c001387620 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.681663 kernel: audit: type=1327 audit(1734061350.460:1339): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.775170 kernel: audit: type=1400 audit(1734061350.461:1340): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.775235 sshd[5359]: Received disconnect from 218.92.0.223 port 26158:11: [preauth] Dec 13 03:42:30.775267 sshd[5359]: Disconnected from authenticating user root 218.92.0.223 port 26158 [preauth] Dec 13 03:42:30.775366 sshd[5359]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Dec 13 03:42:30.775833 systemd[1]: sshd@11-147.75.202.177:22-218.92.0.223:26158.service: Deactivated successfully. Dec 13 03:42:30.865003 kernel: audit: type=1300 audit(1734061350.461:1340): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c007684aa0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c007684aa0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.963293 kernel: audit: type=1327 audit(1734061350.461:1340): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:31.056415 kernel: audit: type=1400 audit(1734061350.461:1341): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:31.147015 kernel: audit: type=1300 audit(1734061350.461:1341): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0059907b0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0059907b0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:31.245619 kernel: audit: type=1327 audit(1734061350.461:1341): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:31.338996 kernel: audit: type=1400 audit(1734061350.461:1342): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00be5b020 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c007684ac0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00be5b050 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:42:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:42:30.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.202.177:22-218.92.0.223:26158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:35.223570 env[1555]: time="2024-12-13T03:42:35.223497322Z" level=info msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.243 [WARNING][5626] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"704af507-b78e-4b4f-8cdb-a5ee4c2261b5", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3", Pod:"coredns-76f75df574-mjs96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de8956fd00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.243 [INFO][5626] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.243 [INFO][5626] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" iface="eth0" netns="" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.244 [INFO][5626] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.244 [INFO][5626] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.257 [INFO][5642] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.257 [INFO][5642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.257 [INFO][5642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.263 [WARNING][5642] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.263 [INFO][5642] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.264 [INFO][5642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.265925 env[1555]: 2024-12-13 03:42:35.265 [INFO][5626] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.266508 env[1555]: time="2024-12-13T03:42:35.265941803Z" level=info msg="TearDown network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" successfully" Dec 13 03:42:35.266508 env[1555]: time="2024-12-13T03:42:35.265969200Z" level=info msg="StopPodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" returns successfully" Dec 13 03:42:35.266508 env[1555]: time="2024-12-13T03:42:35.266323606Z" level=info msg="RemovePodSandbox for \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" Dec 13 03:42:35.266508 env[1555]: time="2024-12-13T03:42:35.266355098Z" level=info msg="Forcibly stopping sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\"" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.290 [WARNING][5674] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"704af507-b78e-4b4f-8cdb-a5ee4c2261b5", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"154e8f6e3b7a9ed8127ec42641f63ec3659068cf8ee497b7d66adb3b37c7d3c3", Pod:"coredns-76f75df574-mjs96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6de8956fd00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.290 [INFO][5674] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.290 [INFO][5674] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" iface="eth0" netns="" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.290 [INFO][5674] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.290 [INFO][5674] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.304 [INFO][5690] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.304 [INFO][5690] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.304 [INFO][5690] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.310 [WARNING][5690] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.310 [INFO][5690] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" HandleID="k8s-pod-network.ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--mjs96-eth0" Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.313 [INFO][5690] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.318486 env[1555]: 2024-12-13 03:42:35.315 [INFO][5674] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb" Dec 13 03:42:35.320034 env[1555]: time="2024-12-13T03:42:35.318537927Z" level=info msg="TearDown network for sandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" successfully" Dec 13 03:42:35.323050 env[1555]: time="2024-12-13T03:42:35.322974860Z" level=info msg="RemovePodSandbox \"ecadb03bfefa1b58a9bded149dc85185150a8d68c921f227a8fb34212e4b56fb\" returns successfully" Dec 13 03:42:35.328227 env[1555]: time="2024-12-13T03:42:35.328142547Z" level=info msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.390 [WARNING][5720] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d", Pod:"coredns-76f75df574-q2j5v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0034b28f1d5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.390 [INFO][5720] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.390 [INFO][5720] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" iface="eth0" netns="" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.390 [INFO][5720] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.390 [INFO][5720] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.408 [INFO][5745] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.408 [INFO][5745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.408 [INFO][5745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.414 [WARNING][5745] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.414 [INFO][5745] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.415 [INFO][5745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.417066 env[1555]: 2024-12-13 03:42:35.416 [INFO][5720] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.417591 env[1555]: time="2024-12-13T03:42:35.417075134Z" level=info msg="TearDown network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" successfully" Dec 13 03:42:35.417591 env[1555]: time="2024-12-13T03:42:35.417103919Z" level=info msg="StopPodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" returns successfully" Dec 13 03:42:35.417591 env[1555]: time="2024-12-13T03:42:35.417366395Z" level=info msg="RemovePodSandbox for \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" Dec 13 03:42:35.417591 env[1555]: time="2024-12-13T03:42:35.417394964Z" level=info msg="Forcibly stopping sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\"" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.444 [WARNING][5773] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b49175c1-6a0b-40f7-b8d9-fe2f55e3c4a2", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"d38324ce4a23cd56b18e9532846fcd7a40efa551c8f3676e5ff924ba0cb3d47d", Pod:"coredns-76f75df574-q2j5v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0034b28f1d5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.444 [INFO][5773] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.444 [INFO][5773] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" iface="eth0" netns="" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.444 [INFO][5773] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.444 [INFO][5773] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.460 [INFO][5787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.460 [INFO][5787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.460 [INFO][5787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.466 [WARNING][5787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.466 [INFO][5787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" HandleID="k8s-pod-network.7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-coredns--76f75df574--q2j5v-eth0" Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.468 [INFO][5787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.469972 env[1555]: 2024-12-13 03:42:35.469 [INFO][5773] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218" Dec 13 03:42:35.470549 env[1555]: time="2024-12-13T03:42:35.469991725Z" level=info msg="TearDown network for sandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" successfully" Dec 13 03:42:35.471954 env[1555]: time="2024-12-13T03:42:35.471907874Z" level=info msg="RemovePodSandbox \"7fc413eb3309cb92b0b843dc6d38ae83a26c664561f48c5aed56a8b9d77ce218\" returns successfully" Dec 13 03:42:35.472308 env[1555]: time="2024-12-13T03:42:35.472267651Z" level=info msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.502 [WARNING][5817] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3407265a-adff-46de-9c22-bac179aa2a85", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d", Pod:"csi-node-driver-l68ds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali50ae507600f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.502 [INFO][5817] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.502 [INFO][5817] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" iface="eth0" netns="" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.502 [INFO][5817] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.502 [INFO][5817] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.520 [INFO][5832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.520 [INFO][5832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.520 [INFO][5832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.526 [WARNING][5832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.526 [INFO][5832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.527 [INFO][5832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.529842 env[1555]: 2024-12-13 03:42:35.528 [INFO][5817] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.529842 env[1555]: time="2024-12-13T03:42:35.529813228Z" level=info msg="TearDown network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" successfully" Dec 13 03:42:35.529842 env[1555]: time="2024-12-13T03:42:35.529840870Z" level=info msg="StopPodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" returns successfully" Dec 13 03:42:35.530487 env[1555]: time="2024-12-13T03:42:35.530211450Z" level=info msg="RemovePodSandbox for \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" Dec 13 03:42:35.530487 env[1555]: time="2024-12-13T03:42:35.530249822Z" level=info msg="Forcibly stopping sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\"" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.560 [WARNING][5863] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3407265a-adff-46de-9c22-bac179aa2a85", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"9d87187aa2f08e2f64e0d4240d817b6eb5b825d63853ab58b5b1db23b07f770d", Pod:"csi-node-driver-l68ds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali50ae507600f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.560 [INFO][5863] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.560 [INFO][5863] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" iface="eth0" netns="" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.560 [INFO][5863] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.560 [INFO][5863] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.577 [INFO][5879] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.577 [INFO][5879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.577 [INFO][5879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.583 [WARNING][5879] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.583 [INFO][5879] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" HandleID="k8s-pod-network.ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-csi--node--driver--l68ds-eth0" Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.584 [INFO][5879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.586611 env[1555]: 2024-12-13 03:42:35.585 [INFO][5863] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314" Dec 13 03:42:35.587177 env[1555]: time="2024-12-13T03:42:35.586617813Z" level=info msg="TearDown network for sandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" successfully" Dec 13 03:42:35.588669 env[1555]: time="2024-12-13T03:42:35.588620946Z" level=info msg="RemovePodSandbox \"ccf773bab1af073a41d636fafcc612828b1cbe39524b512ff8a8e2de774a6314\" returns successfully" Dec 13 03:42:35.589033 env[1555]: time="2024-12-13T03:42:35.588985038Z" level=info msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.619 [WARNING][5909] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"ce5f26d1-e972-4383-9242-e216b0d32e0b", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d", Pod:"calico-apiserver-5ccff7d95d-v445p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57efdb08da8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.619 [INFO][5909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.619 [INFO][5909] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" iface="eth0" netns="" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.619 [INFO][5909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.619 [INFO][5909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.636 [INFO][5923] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.637 [INFO][5923] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.637 [INFO][5923] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.642 [WARNING][5923] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.642 [INFO][5923] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.644 [INFO][5923] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.646046 env[1555]: 2024-12-13 03:42:35.645 [INFO][5909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.646689 env[1555]: time="2024-12-13T03:42:35.646068271Z" level=info msg="TearDown network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" successfully" Dec 13 03:42:35.646689 env[1555]: time="2024-12-13T03:42:35.646096021Z" level=info msg="StopPodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" returns successfully" Dec 13 03:42:35.646689 env[1555]: time="2024-12-13T03:42:35.646468374Z" level=info msg="RemovePodSandbox for \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" Dec 13 03:42:35.646689 env[1555]: time="2024-12-13T03:42:35.646495320Z" level=info msg="Forcibly stopping sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\"" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.676 [WARNING][5954] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"ce5f26d1-e972-4383-9242-e216b0d32e0b", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"f9b82940c83a565d07a103ae200f4a87d5bee1f18807298bc75df84f2f46271d", Pod:"calico-apiserver-5ccff7d95d-v445p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57efdb08da8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.676 [INFO][5954] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.676 [INFO][5954] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" iface="eth0" netns="" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.676 [INFO][5954] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.676 [INFO][5954] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.694 [INFO][5968] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.694 [INFO][5968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.694 [INFO][5968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.700 [WARNING][5968] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.700 [INFO][5968] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" HandleID="k8s-pod-network.4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--v445p-eth0" Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.701 [INFO][5968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.703633 env[1555]: 2024-12-13 03:42:35.702 [INFO][5954] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a" Dec 13 03:42:35.704194 env[1555]: time="2024-12-13T03:42:35.703653476Z" level=info msg="TearDown network for sandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" successfully" Dec 13 03:42:35.705640 env[1555]: time="2024-12-13T03:42:35.705593401Z" level=info msg="RemovePodSandbox \"4ed248782127c3e981b964c2dfc5d0ff41586673bf740eeda19452faef7fd40a\" returns successfully" Dec 13 03:42:35.705983 env[1555]: time="2024-12-13T03:42:35.705938143Z" level=info msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.735 [WARNING][5998] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"0ddb1973-0266-4808-9fcb-3464d106dc6c", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93", Pod:"calico-apiserver-5ccff7d95d-m6zv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88c1dd315bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.735 [INFO][5998] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.735 [INFO][5998] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" iface="eth0" netns="" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.735 [INFO][5998] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.735 [INFO][5998] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.751 [INFO][6010] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.752 [INFO][6010] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.752 [INFO][6010] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.758 [WARNING][6010] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.758 [INFO][6010] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.759 [INFO][6010] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.761734 env[1555]: 2024-12-13 03:42:35.760 [INFO][5998] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.762354 env[1555]: time="2024-12-13T03:42:35.761759662Z" level=info msg="TearDown network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" successfully" Dec 13 03:42:35.762354 env[1555]: time="2024-12-13T03:42:35.761787156Z" level=info msg="StopPodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" returns successfully" Dec 13 03:42:35.762354 env[1555]: time="2024-12-13T03:42:35.762114523Z" level=info msg="RemovePodSandbox for \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" Dec 13 03:42:35.762354 env[1555]: time="2024-12-13T03:42:35.762142889Z" level=info msg="Forcibly stopping sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\"" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.792 [WARNING][6040] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0", GenerateName:"calico-apiserver-5ccff7d95d-", Namespace:"calico-apiserver", SelfLink:"", UID:"0ddb1973-0266-4808-9fcb-3464d106dc6c", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ccff7d95d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"a671bad1534c7188c720446ca639e73b78addd4f15fb9ac9b1f5131ec3c26f93", Pod:"calico-apiserver-5ccff7d95d-m6zv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88c1dd315bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.792 [INFO][6040] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.792 [INFO][6040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" iface="eth0" netns="" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.792 [INFO][6040] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.792 [INFO][6040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.809 [INFO][6059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.809 [INFO][6059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.809 [INFO][6059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.815 [WARNING][6059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.815 [INFO][6059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" HandleID="k8s-pod-network.e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--apiserver--5ccff7d95d--m6zv5-eth0" Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.817 [INFO][6059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.819216 env[1555]: 2024-12-13 03:42:35.818 [INFO][6040] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6" Dec 13 03:42:35.819216 env[1555]: time="2024-12-13T03:42:35.819191427Z" level=info msg="TearDown network for sandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" successfully" Dec 13 03:42:35.821175 env[1555]: time="2024-12-13T03:42:35.821153487Z" level=info msg="RemovePodSandbox \"e4e3b23f2695f3618efcb1812ea96ecd75492475b4ff160392c8d94ae91920e6\" returns successfully" Dec 13 03:42:35.821556 env[1555]: time="2024-12-13T03:42:35.821508097Z" level=info msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.853 [WARNING][6088] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0", GenerateName:"calico-kube-controllers-5cf74b8db4-", Namespace:"calico-system", SelfLink:"", UID:"8fb664ec-4133-4c36-b6c2-dd46aaa5371c", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cf74b8db4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4", Pod:"calico-kube-controllers-5cf74b8db4-grhxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid86e34adcfa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.853 [INFO][6088] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.853 [INFO][6088] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" iface="eth0" netns="" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.853 [INFO][6088] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.853 [INFO][6088] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.872 [INFO][6104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.872 [INFO][6104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.872 [INFO][6104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.878 [WARNING][6104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.878 [INFO][6104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.880 [INFO][6104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.882159 env[1555]: 2024-12-13 03:42:35.881 [INFO][6088] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.882871 env[1555]: time="2024-12-13T03:42:35.882159158Z" level=info msg="TearDown network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" successfully" Dec 13 03:42:35.882871 env[1555]: time="2024-12-13T03:42:35.882193168Z" level=info msg="StopPodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" returns successfully" Dec 13 03:42:35.882871 env[1555]: time="2024-12-13T03:42:35.882613868Z" level=info msg="RemovePodSandbox for \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" Dec 13 03:42:35.882871 env[1555]: time="2024-12-13T03:42:35.882645912Z" level=info msg="Forcibly stopping sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\"" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.916 [WARNING][6135] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0", GenerateName:"calico-kube-controllers-5cf74b8db4-", Namespace:"calico-system", SelfLink:"", UID:"8fb664ec-4133-4c36-b6c2-dd46aaa5371c", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 41, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cf74b8db4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-cc0c4ef4b9", ContainerID:"51499603d17e9dd09d37a7bf0ee5bac182bf327121f312beb7fdca32d589cec4", Pod:"calico-kube-controllers-5cf74b8db4-grhxb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid86e34adcfa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.916 [INFO][6135] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.916 [INFO][6135] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" iface="eth0" netns="" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.916 [INFO][6135] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.916 [INFO][6135] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.935 [INFO][6150] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.935 [INFO][6150] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.936 [INFO][6150] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.941 [WARNING][6150] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.941 [INFO][6150] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" HandleID="k8s-pod-network.f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Workload="ci--3510.3.6--a--cc0c4ef4b9-k8s-calico--kube--controllers--5cf74b8db4--grhxb-eth0" Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.942 [INFO][6150] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:42:35.944023 env[1555]: 2024-12-13 03:42:35.943 [INFO][6135] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408" Dec 13 03:42:35.944536 env[1555]: time="2024-12-13T03:42:35.944018648Z" level=info msg="TearDown network for sandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" successfully" Dec 13 03:42:35.945778 env[1555]: time="2024-12-13T03:42:35.945727536Z" level=info msg="RemovePodSandbox \"f24150afb8eeaae3851dbbc1a2104cbd25930a0e485fdec9ffa476022c647408\" returns successfully" Dec 13 03:42:46.249000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.278532 kernel: kauditd_printk_skb: 9 callbacks suppressed Dec 13 03:42:46.278631 kernel: audit: type=1400 audit(1734061366.249:1346): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.249000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000517a80 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:46.379943 kubelet[2627]: I1213 03:42:46.379886 2627 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:42:46.486460 kernel: audit: type=1300 audit(1734061366.249:1346): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000517a80 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:46.486539 kernel: audit: type=1327 audit(1734061366.249:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.667664 kernel: audit: type=1400 audit(1734061366.250:1347): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.667746 kernel: audit: type=1300 audit(1734061366.250:1347): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120efa0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120efa0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.880424 kernel: audit: type=1327 audit(1734061366.250:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.880496 kernel: audit: type=1400 audit(1734061366.250:1348): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010e1be0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:47.090199 kernel: audit: type=1300 audit(1734061366.250:1348): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010e1be0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:47.090308 kernel: audit: type=1327 audit(1734061366.250:1348): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:47.273212 kernel: audit: type=1400 audit(1734061366.250:1349): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:42:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010e1c00 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:42:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:42:46.585000 audit[6220]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:46.585000 audit[6220]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc226c360 a2=0 a3=7ffcc226c34c items=0 ppid=2869 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:46.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:42:47.183000 audit[6220]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=6220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:42:47.183000 audit[6220]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc226c360 a2=0 a3=7ffcc226c34c items=0 ppid=2869 pid=6220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:47.183000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:43:21.819000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:43:21.862905 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 03:43:21.863031 kernel: audit: type=1400 audit(1734061401.819:1352): avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:43:21.819000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610d20 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:43:22.076872 kernel: audit: type=1300 audit(1734061401.819:1352): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610d20 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:43:22.076956 kernel: audit: type=1327 audit(1734061401.819:1352): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:43:21.819000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:43:25.743000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:43:25.743000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001178120 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:43:25.960942 kernel: audit: type=1400 audit(1734061405.743:1353): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:43:25.961046 kernel: audit: type=1300 audit(1734061405.743:1353): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001178120 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:43:25.961065 kernel: audit: type=1327 audit(1734061405.743:1353): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:43:25.743000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:43:30.265000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.265000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.446901 kernel: audit: type=1400 audit(1734061410.265:1354): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.446946 kernel: audit: type=1400 audit(1734061410.265:1355): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.446962 kernel: audit: type=1300 audit(1734061410.265:1354): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ece1c0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:30.265000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ece1c0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:30.569698 kernel: audit: type=1300 audit(1734061410.265:1355): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddc900 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:30.265000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddc900 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:30.689680 kernel: audit: type=1327 audit(1734061410.265:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:30.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:30.782783 kernel: audit: type=1327 audit(1734061410.265:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:30.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:30.875884 kernel: audit: type=1400 audit(1734061410.461:1356): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.968085 kernel: audit: type=1300 audit(1734061410.461:1356): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013814690 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013814690 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:31.158293 kernel: audit: type=1400 audit(1734061410.461:1357): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:31.158327 kernel: audit: type=1327 audit(1734061410.461:1356): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00cd21080 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0102a3ca0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c007c01580 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00cd210e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e276a80 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:43:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:43:46.249000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.279398 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 03:43:46.279476 kernel: audit: type=1400 audit(1734061426.249:1362): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.249000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001312140 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.491862 kernel: audit: type=1300 audit(1734061426.249:1362): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001312140 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.491904 kernel: audit: type=1327 audit(1734061426.249:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:46.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:46.585179 kernel: audit: type=1400 audit(1734061426.250:1363): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.675011 kernel: audit: type=1300 audit(1734061426.250:1363): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b97de0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b97de0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:46.888837 kernel: audit: type=1327 audit(1734061426.250:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:46.888871 kernel: audit: type=1400 audit(1734061426.250:1364): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.978689 kernel: audit: type=1300 audit(1734061426.250:1364): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001312160 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001312160 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:47.099188 kernel: audit: type=1327 audit(1734061426.250:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:43:47.193177 kernel: audit: type=1400 audit(1734061426.250:1365): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:43:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001b97e00 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:43:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:21.819000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:44:21.865395 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 03:44:21.865479 kernel: audit: type=1400 audit(1734061461.819:1366): avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:44:21.819000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610e40 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:44:21.960419 kernel: audit: type=1300 audit(1734061461.819:1366): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610e40 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:44:21.819000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:44:22.173869 kernel: audit: type=1327 audit(1734061461.819:1366): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:44:25.743000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:44:25.743000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001470180 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:44:25.963418 kernel: audit: type=1400 audit(1734061465.743:1367): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:44:25.963510 kernel: audit: type=1300 audit(1734061465.743:1367): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001470180 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:44:25.963527 kernel: audit: type=1327 audit(1734061465.743:1367): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:44:25.743000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:44:30.264000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.264000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ecf5a0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:30.479659 kernel: audit: type=1400 audit(1734061470.264:1368): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.479746 kernel: audit: type=1300 audit(1734061470.264:1368): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ecf5a0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:30.479763 kernel: audit: type=1327 audit(1734061470.264:1368): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:30.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:30.264000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.665029 kernel: audit: type=1400 audit(1734061470.264:1369): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.665068 kernel: audit: type=1300 audit(1734061470.264:1369): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028177d0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:30.264000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028177d0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:30.784959 kernel: audit: type=1327 audit(1734061470.264:1369): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:30.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:30.877915 kernel: audit: type=1400 audit(1734061470.461:1370): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.968953 kernel: audit: type=1300 audit(1734061470.461:1370): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c006fdc7e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c006fdc7e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:31.067176 kernel: audit: type=1327 audit(1734061470.461:1370): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:31.161064 kernel: audit: type=1400 audit(1734061470.461:1371): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ef25f20 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ef25f80 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00da843e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00f4d07b0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:30.461000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:30.461000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c004043bc0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:44:30.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:44:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.281083 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 03:44:46.281156 kernel: audit: type=1400 audit(1734061486.250:1376): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ecfe40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.493210 kernel: audit: type=1300 audit(1734061486.250:1376): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ecfe40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.493245 kernel: audit: type=1327 audit(1734061486.250:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:46.586264 kernel: audit: type=1400 audit(1734061486.250:1377): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.250000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.675862 kernel: audit: type=1300 audit(1734061486.250:1377): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ecfe60 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.250000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ecfe60 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.795890 kernel: audit: type=1327 audit(1734061486.250:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:46.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:46.888957 kernel: audit: type=1400 audit(1734061486.251:1378): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.251000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.978518 kernel: audit: type=1300 audit(1734061486.251:1378): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00086e280 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.251000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00086e280 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:47.098567 kernel: audit: type=1327 audit(1734061486.251:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:46.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:47.191556 kernel: audit: type=1400 audit(1734061486.251:1379): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.251000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:44:46.251000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000a13300 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:44:46.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:44:51.856937 systemd[1]: Started sshd@12-147.75.202.177:22-2.57.122.193:55956.service. Dec 13 03:44:51.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.202.177:22-2.57.122.193:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:44:51.884118 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 03:44:51.884190 kernel: audit: type=1130 audit(1734061491.855:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.202.177:22-2.57.122.193:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:44:52.576518 sshd[6503]: Invalid user monitoring from 2.57.122.193 port 55956 Dec 13 03:44:52.757390 sshd[6503]: pam_faillock(sshd:auth): User unknown Dec 13 03:44:52.758629 sshd[6503]: pam_unix(sshd:auth): check pass; user unknown Dec 13 03:44:52.758724 sshd[6503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.193 Dec 13 03:44:52.759863 sshd[6503]: pam_faillock(sshd:auth): User unknown Dec 13 03:44:52.758000 audit[6503]: USER_AUTH pid=6503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monitoring" exe="/usr/sbin/sshd" hostname=2.57.122.193 addr=2.57.122.193 terminal=ssh res=failed' Dec 13 03:44:52.853411 kernel: audit: type=1100 audit(1734061492.758:1381): pid=6503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="monitoring" exe="/usr/sbin/sshd" hostname=2.57.122.193 addr=2.57.122.193 terminal=ssh res=failed' Dec 13 03:44:54.364637 sshd[6503]: Failed password for invalid user monitoring from 2.57.122.193 port 55956 ssh2 Dec 13 03:44:54.939295 sshd[6503]: Connection closed by invalid user monitoring 2.57.122.193 port 55956 [preauth] Dec 13 03:44:54.941890 systemd[1]: sshd@12-147.75.202.177:22-2.57.122.193:55956.service: Deactivated successfully. Dec 13 03:44:54.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.202.177:22-2.57.122.193:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:44:55.033371 kernel: audit: type=1131 audit(1734061494.941:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.202.177:22-2.57.122.193:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:12.432811 systemd[1]: Started sshd@13-147.75.202.177:22-218.92.0.229:44812.service. Dec 13 03:45:12.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.202.177:22-218.92.0.229:44812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:12.523348 kernel: audit: type=1130 audit(1734061512.431:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.202.177:22-218.92.0.229:44812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:13.459569 sshd[6551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:13.458000 audit[6551]: USER_AUTH pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:13.551518 kernel: audit: type=1100 audit(1734061513.458:1384): pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:15.947626 sshd[6551]: Failed password for root from 218.92.0.229 port 44812 ssh2 Dec 13 03:45:17.764000 audit[6551]: USER_AUTH pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:17.862381 kernel: audit: type=1100 audit(1734061517.764:1385): pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:19.802101 sshd[6551]: Failed password for root from 218.92.0.229 port 44812 ssh2 Dec 13 03:45:19.995000 audit[6551]: USER_AUTH pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:20.087438 kernel: audit: type=1100 audit(1734061519.995:1386): pid=6551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:21.820000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:45:21.820000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610040 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:45:22.039875 kernel: audit: type=1400 audit(1734061521.820:1387): avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:45:22.039918 kernel: audit: type=1300 audit(1734061521.820:1387): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001610040 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:45:22.039937 kernel: audit: type=1327 audit(1734061521.820:1387): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:45:21.820000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:45:22.308549 sshd[6551]: Failed password for root from 218.92.0.229 port 44812 ssh2 Dec 13 03:45:24.302362 sshd[6551]: Received disconnect from 218.92.0.229 port 44812:11: [preauth] Dec 13 03:45:24.302362 sshd[6551]: Disconnected from authenticating user root 218.92.0.229 port 44812 [preauth] Dec 13 03:45:24.302575 sshd[6551]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:24.303418 systemd[1]: sshd@13-147.75.202.177:22-218.92.0.229:44812.service: Deactivated successfully. Dec 13 03:45:24.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.202.177:22-218.92.0.229:44812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:24.395536 kernel: audit: type=1131 audit(1734061524.302:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.202.177:22-218.92.0.229:44812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:24.506624 systemd[1]: Started sshd@14-147.75.202.177:22-218.92.0.229:40764.service. Dec 13 03:45:24.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.202.177:22-218.92.0.229:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:24.598426 kernel: audit: type=1130 audit(1734061524.505:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.202.177:22-218.92.0.229:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:25.643134 sshd[6584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:25.642000 audit[6584]: USER_AUTH pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:25.734386 kernel: audit: type=1100 audit(1734061525.642:1390): pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:25.744000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:45:25.744000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014f0000 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:45:25.964008 kernel: audit: type=1400 audit(1734061525.744:1391): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:45:25.964079 kernel: audit: type=1300 audit(1734061525.744:1391): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014f0000 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:45:25.964097 kernel: audit: type=1327 audit(1734061525.744:1391): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:45:25.744000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:45:28.111367 sshd[6584]: Failed password for root from 218.92.0.229 port 40764 ssh2 Dec 13 03:45:29.965000 audit[6584]: ANOM_LOGIN_FAILURES pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:29.967031 sshd[6584]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 03:45:29.965000 audit[6584]: USER_AUTH pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:30.122531 kernel: audit: type=2100 audit(1734061529.965:1392): pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:30.122613 kernel: audit: type=1100 audit(1734061529.965:1393): pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:30.265000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.265000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00122cd50 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:30.482698 kernel: audit: type=1400 audit(1734061530.265:1394): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.482750 kernel: audit: type=1300 audit(1734061530.265:1394): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00122cd50 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:30.482769 kernel: audit: type=1327 audit(1734061530.265:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:30.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:30.576994 kernel: audit: type=1400 audit(1734061530.265:1395): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.265000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.667784 kernel: audit: type=1300 audit(1734061530.265:1395): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000517c20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:30.265000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000517c20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:30.789238 kernel: audit: type=1327 audit(1734061530.265:1395): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:30.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:30.883371 kernel: audit: type=1400 audit(1734061530.462:1396): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.975579 kernel: audit: type=1300 audit(1734061530.462:1396): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012baac30 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012baac30 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00d5b88a0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01344e780 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00d5b88e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00cf49950 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00e4d5590 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:45:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:45:31.982561 sshd[6584]: Failed password for root from 218.92.0.229 port 40764 ssh2 Dec 13 03:45:32.213000 audit[6584]: USER_AUTH pid=6584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:34.977649 sshd[6584]: Failed password for root from 218.92.0.229 port 40764 ssh2 Dec 13 03:45:36.537545 sshd[6584]: Received disconnect from 218.92.0.229 port 40764:11: [preauth] Dec 13 03:45:36.537545 sshd[6584]: Disconnected from authenticating user root 218.92.0.229 port 40764 [preauth] Dec 13 03:45:36.538178 sshd[6584]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:36.540219 systemd[1]: sshd@14-147.75.202.177:22-218.92.0.229:40764.service: Deactivated successfully. Dec 13 03:45:36.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.202.177:22-218.92.0.229:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:36.568880 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 03:45:36.568913 kernel: audit: type=1131 audit(1734061536.539:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.202.177:22-218.92.0.229:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:36.671241 systemd[1]: Started sshd@15-147.75.202.177:22-218.92.0.229:13374.service. Dec 13 03:45:36.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.202.177:22-218.92.0.229:13374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:36.761364 kernel: audit: type=1130 audit(1734061536.669:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.202.177:22-218.92.0.229:13374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:37.679128 sshd[6610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:37.678000 audit[6610]: USER_AUTH pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:37.771390 kernel: audit: type=1100 audit(1734061537.678:1405): pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:40.126747 sshd[6610]: Failed password for root from 218.92.0.229 port 13374 ssh2 Dec 13 03:45:41.988000 audit[6610]: USER_AUTH pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:42.082537 kernel: audit: type=1100 audit(1734061541.988:1406): pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:44.321580 sshd[6610]: Failed password for root from 218.92.0.229 port 13374 ssh2 Dec 13 03:45:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001313ca0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.467942 kernel: audit: type=1400 audit(1734061546.252:1407): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.468008 kernel: audit: type=1300 audit(1734061546.252:1407): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001313ca0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.468037 kernel: audit: type=1327 audit(1734061546.252:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.562333 kernel: audit: type=1400 audit(1734061546.252:1408): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00120e040 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.774317 kernel: audit: type=1300 audit(1734061546.252:1408): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00120e040 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.774348 kernel: audit: type=1327 audit(1734061546.252:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.868537 kernel: audit: type=1400 audit(1734061546.253:1409): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.960166 kernel: audit: type=1300 audit(1734061546.253:1409): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001313cc0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001313cc0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:47.082082 kernel: audit: type=1327 audit(1734061546.253:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:47.177072 kernel: audit: type=1400 audit(1734061546.253:1410): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:45:47.268949 kernel: audit: type=1300 audit(1734061546.253:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0e000 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0e000 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:45:47.392061 kernel: audit: type=1327 audit(1734061546.253:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:45:47.486196 kernel: audit: type=1100 audit(1734061546.346:1411): pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:46.346000 audit[6610]: USER_AUTH pid=6610 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' Dec 13 03:45:48.031617 sshd[6610]: Failed password for root from 218.92.0.229 port 13374 ssh2 Dec 13 03:45:48.573971 sshd[6610]: Received disconnect from 218.92.0.229 port 13374:11: [preauth] Dec 13 03:45:48.573971 sshd[6610]: Disconnected from authenticating user root 218.92.0.229 port 13374 [preauth] Dec 13 03:45:48.574456 sshd[6610]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root Dec 13 03:45:48.576395 systemd[1]: sshd@15-147.75.202.177:22-218.92.0.229:13374.service: Deactivated successfully. Dec 13 03:45:48.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.202.177:22-218.92.0.229:13374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:45:48.669441 kernel: audit: type=1131 audit(1734061548.576:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.202.177:22-218.92.0.229:13374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:46:00.727997 systemd[1]: Started sshd@16-147.75.202.177:22-2.57.122.33:56654.service. Dec 13 03:46:00.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.202.177:22-2.57.122.33:56654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:46:00.818536 kernel: audit: type=1130 audit(1734061560.727:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.202.177:22-2.57.122.33:56654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:46:00.904332 sshd[6681]: kex_exchange_identification: Connection closed by remote host Dec 13 03:46:00.904332 sshd[6681]: Connection closed by 2.57.122.33 port 56654 Dec 13 03:46:00.905957 systemd[1]: sshd@16-147.75.202.177:22-2.57.122.33:56654.service: Deactivated successfully. Dec 13 03:46:00.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.202.177:22-2.57.122.33:56654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:46:01.003406 kernel: audit: type=1131 audit(1734061560.906:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.202.177:22-2.57.122.33:56654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:46:21.821000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:46:21.821000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00294c040 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:46:22.040320 kernel: audit: type=1400 audit(1734061581.821:1415): avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:46:22.040365 kernel: audit: type=1300 audit(1734061581.821:1415): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00294c040 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:46:22.040382 kernel: audit: type=1327 audit(1734061581.821:1415): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:46:21.821000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:46:25.744000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:46:25.744000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014f0020 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:46:25.970697 kernel: audit: type=1400 audit(1734061585.744:1416): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:46:25.970740 kernel: audit: type=1300 audit(1734061585.744:1416): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014f0020 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:46:25.970759 kernel: audit: type=1327 audit(1734061585.744:1416): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:46:25.744000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:46:30.266000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.266000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b15bc0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:30.483413 kernel: audit: type=1400 audit(1734061590.266:1417): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.483493 kernel: audit: type=1300 audit(1734061590.266:1417): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b15bc0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:30.483515 kernel: audit: type=1327 audit(1734061590.266:1417): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:30.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:30.577537 kernel: audit: type=1400 audit(1734061590.266:1418): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.266000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.668113 kernel: audit: type=1300 audit(1734061590.266:1418): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00120fd20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:30.266000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00120fd20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:30.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:30.883539 kernel: audit: type=1327 audit(1734061590.266:1418): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:30.883576 kernel: audit: type=1400 audit(1734061590.462:1419): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.974151 kernel: audit: type=1300 audit(1734061590.462:1419): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0063ed700 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0063ed700 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:31.073208 kernel: audit: type=1327 audit(1734061590.462:1419): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:31.257695 kernel: audit: type=1400 audit(1734061590.462:1420): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007b9a2c0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0109e0a50 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0080611d0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0109e0ab0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:30.462000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:30.462000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0080612f0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:46:30.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:46:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.281543 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 03:46:46.281619 kernel: audit: type=1400 audit(1734061606.252:1425): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019384c0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:46.492986 kernel: audit: type=1300 audit(1734061606.252:1425): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019384c0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:46.493024 kernel: audit: type=1327 audit(1734061606.252:1425): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:46.585984 kernel: audit: type=1400 audit(1734061606.252:1426): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.675468 kernel: audit: type=1300 audit(1734061606.252:1426): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e01e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010e01e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:46.795414 kernel: audit: type=1327 audit(1734061606.252:1426): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:46.888359 kernel: audit: type=1400 audit(1734061606.252:1427): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d0f320 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:47.097851 kernel: audit: type=1300 audit(1734061606.252:1427): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d0f320 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:47.097882 kernel: audit: type=1327 audit(1734061606.252:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:46:47.191498 kernel: audit: type=1400 audit(1734061606.252:1428): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:46:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cf40e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:46:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:21.822000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:47:21.864416 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 03:47:21.864503 kernel: audit: type=1400 audit(1734061641.822:1429): avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:47:21.822000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00103e0a0 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:47:22.080824 kernel: audit: type=1300 audit(1734061641.822:1429): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00103e0a0 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:47:22.080857 kernel: audit: type=1327 audit(1734061641.822:1429): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:47:21.822000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:47:25.746000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:47:25.746000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001708000 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:47:25.968061 kernel: audit: type=1400 audit(1734061645.746:1430): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:47:25.968105 kernel: audit: type=1300 audit(1734061645.746:1430): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001708000 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:47:25.968122 kernel: audit: type=1327 audit(1734061645.746:1430): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:47:25.746000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:47:30.268000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.268000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b927e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:30.481836 kernel: audit: type=1400 audit(1734061650.268:1431): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.481887 kernel: audit: type=1300 audit(1734061650.268:1431): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b927e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:30.481905 kernel: audit: type=1327 audit(1734061650.268:1431): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:30.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:30.574714 kernel: audit: type=1400 audit(1734061650.268:1432): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.268000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.664264 kernel: audit: type=1300 audit(1734061650.268:1432): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8a540 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:30.268000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8a540 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:30.784344 kernel: audit: type=1327 audit(1734061650.268:1432): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:30.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:30.877312 kernel: audit: type=1400 audit(1734061650.463:1433): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.967738 kernel: audit: type=1300 audit(1734061650.463:1433): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01030a750 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01030a750 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:31.066006 kernel: audit: type=1327 audit(1734061650.463:1433): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:31.159992 kernel: audit: type=1400 audit(1734061650.463:1434): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00cd21080 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0066374e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:30.464000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.464000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0084ce020 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:30.464000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.464000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006d55ce0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:30.464000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:30.464000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00cd21110 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:47:30.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:47:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.281868 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 03:47:46.281947 kernel: audit: type=1400 audit(1734061666.252:1439): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028657e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.493974 kernel: audit: type=1300 audit(1734061666.252:1439): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028657e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.494012 kernel: audit: type=1327 audit(1734061666.252:1439): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:46.587170 kernel: audit: type=1400 audit(1734061666.252:1440): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.252000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.676898 kernel: audit: type=1300 audit(1734061666.252:1440): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c8af20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.252000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c8af20 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.797239 kernel: audit: type=1327 audit(1734061666.252:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:46.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:46.890372 kernel: audit: type=1400 audit(1734061666.253:1441): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.980006 kernel: audit: type=1300 audit(1734061666.253:1441): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8af40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8af40 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:47.100446 kernel: audit: type=1327 audit(1734061666.253:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:47.282905 kernel: audit: type=1400 audit(1734061666.253:1442): avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:47:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002c745e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:47:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:47:55.212937 systemd[1]: Started sshd@17-147.75.202.177:22-92.255.85.189:28994.service. Dec 13 03:47:55.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.202.177:22-92.255.85.189:28994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:55.240174 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 03:47:55.240235 kernel: audit: type=1130 audit(1734061675.211:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.202.177:22-92.255.85.189:28994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:57.093561 sshd[6926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.189 user=root Dec 13 03:47:57.092000 audit[6926]: USER_AUTH pid=6926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=92.255.85.189 addr=92.255.85.189 terminal=ssh res=failed' Dec 13 03:47:57.182408 kernel: audit: type=1100 audit(1734061677.092:1444): pid=6926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=92.255.85.189 addr=92.255.85.189 terminal=ssh res=failed' Dec 13 03:47:58.763568 sshd[6926]: Failed password for root from 92.255.85.189 port 28994 ssh2 Dec 13 03:47:59.352133 sshd[6926]: Connection closed by authenticating user root 92.255.85.189 port 28994 [preauth] Dec 13 03:47:59.354765 systemd[1]: sshd@17-147.75.202.177:22-92.255.85.189:28994.service: Deactivated successfully. Dec 13 03:47:59.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.202.177:22-92.255.85.189:28994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:47:59.446537 kernel: audit: type=1131 audit(1734061679.353:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.202.177:22-92.255.85.189:28994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:04.992005 systemd[1]: Started sshd@18-147.75.202.177:22-139.178.68.195:47894.service. Dec 13 03:48:04.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.202.177:22-139.178.68.195:47894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:05.086415 kernel: audit: type=1130 audit(1734061684.991:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.202.177:22-139.178.68.195:47894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:05.110000 audit[6954]: USER_ACCT pid=6954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.112650 sshd[6954]: Accepted publickey for core from 139.178.68.195 port 47894 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:05.116288 sshd[6954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:05.126485 systemd-logind[1593]: New session 12 of user core. Dec 13 03:48:05.128940 systemd[1]: Started session-12.scope. Dec 13 03:48:05.113000 audit[6954]: CRED_ACQ pid=6954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.219821 sshd[6954]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:05.221157 systemd[1]: sshd@18-147.75.202.177:22-139.178.68.195:47894.service: Deactivated successfully. Dec 13 03:48:05.221597 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 03:48:05.222001 systemd-logind[1593]: Session 12 logged out. Waiting for processes to exit. Dec 13 03:48:05.222562 systemd-logind[1593]: Removed session 12. Dec 13 03:48:05.296413 kernel: audit: type=1101 audit(1734061685.110:1447): pid=6954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.296450 kernel: audit: type=1103 audit(1734061685.113:1448): pid=6954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.296470 kernel: audit: type=1006 audit(1734061685.114:1449): pid=6954 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 03:48:05.114000 audit[6954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe37f33dc0 a2=3 a3=0 items=0 ppid=1 pid=6954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.448212 kernel: audit: type=1300 audit(1734061685.114:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe37f33dc0 a2=3 a3=0 items=0 ppid=1 pid=6954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:05.448265 kernel: audit: type=1327 audit(1734061685.114:1449): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:05.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:05.479081 kernel: audit: type=1105 audit(1734061685.136:1450): pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.136000 audit[6954]: USER_START pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.574744 kernel: audit: type=1103 audit(1734061685.138:1451): pid=6956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.138000 audit[6956]: CRED_ACQ pid=6956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.664169 kernel: audit: type=1106 audit(1734061685.219:1452): pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.219000 audit[6954]: USER_END pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.759915 kernel: audit: type=1104 audit(1734061685.219:1453): pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.219000 audit[6954]: CRED_DISP pid=6954 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:05.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.202.177:22-139.178.68.195:47894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:10.231741 systemd[1]: Started sshd@19-147.75.202.177:22-139.178.68.195:56838.service. Dec 13 03:48:10.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.202.177:22-139.178.68.195:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:10.259656 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:48:10.259701 kernel: audit: type=1130 audit(1734061690.230:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.202.177:22-139.178.68.195:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:10.374000 audit[7002]: USER_ACCT pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.376418 sshd[7002]: Accepted publickey for core from 139.178.68.195 port 56838 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:10.377832 sshd[7002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:10.380131 systemd-logind[1593]: New session 13 of user core. Dec 13 03:48:10.380620 systemd[1]: Started session-13.scope. Dec 13 03:48:10.458257 sshd[7002]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:10.459781 systemd[1]: sshd@19-147.75.202.177:22-139.178.68.195:56838.service: Deactivated successfully. Dec 13 03:48:10.460230 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 03:48:10.460652 systemd-logind[1593]: Session 13 logged out. Waiting for processes to exit. Dec 13 03:48:10.461153 systemd-logind[1593]: Removed session 13. Dec 13 03:48:10.376000 audit[7002]: CRED_ACQ pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.558688 kernel: audit: type=1101 audit(1734061690.374:1456): pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.558721 kernel: audit: type=1103 audit(1734061690.376:1457): pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.558740 kernel: audit: type=1006 audit(1734061690.376:1458): pid=7002 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 03:48:10.617957 kernel: audit: type=1300 audit(1734061690.376:1458): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3cf8e250 a2=3 a3=0 items=0 ppid=1 pid=7002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:10.376000 audit[7002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3cf8e250 a2=3 a3=0 items=0 ppid=1 pid=7002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:10.711043 kernel: audit: type=1327 audit(1734061690.376:1458): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:10.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:10.741875 kernel: audit: type=1105 audit(1734061690.381:1459): pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.381000 audit[7002]: USER_START pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.837425 kernel: audit: type=1103 audit(1734061690.382:1460): pid=7004 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.382000 audit[7004]: CRED_ACQ pid=7004 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.926746 kernel: audit: type=1106 audit(1734061690.457:1461): pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.457000 audit[7002]: USER_END pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:11.022324 kernel: audit: type=1104 audit(1734061690.457:1462): pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.457000 audit[7002]: CRED_DISP pid=7002 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:10.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.202.177:22-139.178.68.195:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:15.467618 systemd[1]: Started sshd@20-147.75.202.177:22-139.178.68.195:56850.service. Dec 13 03:48:15.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.202.177:22-139.178.68.195:56850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:15.494813 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:48:15.494898 kernel: audit: type=1130 audit(1734061695.466:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.202.177:22-139.178.68.195:56850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:15.608000 audit[7055]: USER_ACCT pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.610315 sshd[7055]: Accepted publickey for core from 139.178.68.195 port 56850 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:15.611685 sshd[7055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:15.614087 systemd-logind[1593]: New session 14 of user core. Dec 13 03:48:15.614524 systemd[1]: Started session-14.scope. Dec 13 03:48:15.693593 sshd[7055]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:15.694939 systemd[1]: sshd@20-147.75.202.177:22-139.178.68.195:56850.service: Deactivated successfully. Dec 13 03:48:15.695371 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 03:48:15.695757 systemd-logind[1593]: Session 14 logged out. Waiting for processes to exit. Dec 13 03:48:15.696188 systemd-logind[1593]: Removed session 14. Dec 13 03:48:15.610000 audit[7055]: CRED_ACQ pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.792344 kernel: audit: type=1101 audit(1734061695.608:1465): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.792388 kernel: audit: type=1103 audit(1734061695.610:1466): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.792406 kernel: audit: type=1006 audit(1734061695.610:1467): pid=7055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 03:48:15.850983 kernel: audit: type=1300 audit(1734061695.610:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb9dd55a0 a2=3 a3=0 items=0 ppid=1 pid=7055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:15.610000 audit[7055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb9dd55a0 a2=3 a3=0 items=0 ppid=1 pid=7055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:15.943184 kernel: audit: type=1327 audit(1734061695.610:1467): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:15.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:15.615000 audit[7055]: USER_START pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:16.068358 kernel: audit: type=1105 audit(1734061695.615:1468): pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:16.068393 kernel: audit: type=1103 audit(1734061695.615:1469): pid=7057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.615000 audit[7057]: CRED_ACQ pid=7057 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.692000 audit[7055]: USER_END pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:16.253290 kernel: audit: type=1106 audit(1734061695.692:1470): pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:16.253327 kernel: audit: type=1104 audit(1734061695.692:1471): pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.692000 audit[7055]: CRED_DISP pid=7055 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:15.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.202.177:22-139.178.68.195:56850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:20.705485 systemd[1]: Started sshd@21-147.75.202.177:22-139.178.68.195:51442.service. Dec 13 03:48:20.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.202.177:22-139.178.68.195:51442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:20.733112 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:48:20.733197 kernel: audit: type=1130 audit(1734061700.704:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.202.177:22-139.178.68.195:51442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:20.859000 audit[7082]: USER_ACCT pid=7082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:20.861263 sshd[7082]: Accepted publickey for core from 139.178.68.195 port 51442 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:20.863997 sshd[7082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:20.868614 systemd-logind[1593]: New session 15 of user core. Dec 13 03:48:20.869772 systemd[1]: Started session-15.scope. Dec 13 03:48:20.862000 audit[7082]: CRED_ACQ pid=7082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:20.954831 sshd[7082]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:20.956727 systemd[1]: sshd@21-147.75.202.177:22-139.178.68.195:51442.service: Deactivated successfully. Dec 13 03:48:20.957052 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 03:48:20.957334 systemd-logind[1593]: Session 15 logged out. Waiting for processes to exit. Dec 13 03:48:20.958051 systemd[1]: Started sshd@22-147.75.202.177:22-139.178.68.195:51454.service. Dec 13 03:48:20.958567 systemd-logind[1593]: Removed session 15. Dec 13 03:48:21.044316 kernel: audit: type=1101 audit(1734061700.859:1474): pid=7082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.044381 kernel: audit: type=1103 audit(1734061700.862:1475): pid=7082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.044402 kernel: audit: type=1006 audit(1734061700.862:1476): pid=7082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 03:48:21.069659 sshd[7108]: Accepted publickey for core from 139.178.68.195 port 51454 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:21.070863 sshd[7108]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:21.073192 systemd-logind[1593]: New session 16 of user core. Dec 13 03:48:21.073690 systemd[1]: Started session-16.scope. Dec 13 03:48:21.103032 kernel: audit: type=1300 audit(1734061700.862:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a3872a0 a2=3 a3=0 items=0 ppid=1 pid=7082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:20.862000 audit[7082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a3872a0 a2=3 a3=0 items=0 ppid=1 pid=7082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:21.168131 sshd[7108]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:21.170054 systemd[1]: sshd@22-147.75.202.177:22-139.178.68.195:51454.service: Deactivated successfully. Dec 13 03:48:21.170423 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 03:48:21.170714 systemd-logind[1593]: Session 16 logged out. Waiting for processes to exit. Dec 13 03:48:21.171347 systemd[1]: Started sshd@23-147.75.202.177:22-139.178.68.195:51456.service. Dec 13 03:48:21.171771 systemd-logind[1593]: Removed session 16. Dec 13 03:48:21.195120 kernel: audit: type=1327 audit(1734061700.862:1476): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:20.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:20.873000 audit[7082]: USER_START pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.251023 sshd[7131]: Accepted publickey for core from 139.178.68.195 port 51456 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:21.252409 sshd[7131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:21.254588 systemd-logind[1593]: New session 17 of user core. Dec 13 03:48:21.255065 systemd[1]: Started session-17.scope. Dec 13 03:48:21.320350 kernel: audit: type=1105 audit(1734061700.873:1477): pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.320464 kernel: audit: type=1103 audit(1734061700.875:1478): pid=7084 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:20.875000 audit[7084]: CRED_ACQ pid=7084 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.333992 sshd[7131]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:21.335244 systemd[1]: sshd@23-147.75.202.177:22-139.178.68.195:51456.service: Deactivated successfully. Dec 13 03:48:21.335700 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 03:48:21.336035 systemd-logind[1593]: Session 17 logged out. Waiting for processes to exit. Dec 13 03:48:21.336467 systemd-logind[1593]: Removed session 17. Dec 13 03:48:20.954000 audit[7082]: USER_END pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.410426 kernel: audit: type=1106 audit(1734061700.954:1479): pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:20.954000 audit[7082]: CRED_DISP pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.594426 kernel: audit: type=1104 audit(1734061700.954:1480): pid=7082 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:20.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.202.177:22-139.178.68.195:51442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:20.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.202.177:22-139.178.68.195:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:21.068000 audit[7108]: USER_ACCT pid=7108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.069000 audit[7108]: CRED_ACQ pid=7108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.069000 audit[7108]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea95b6090 a2=3 a3=0 items=0 ppid=1 pid=7108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:21.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:21.074000 audit[7108]: USER_START pid=7108 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.074000 audit[7110]: CRED_ACQ pid=7110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.167000 audit[7108]: USER_END pid=7108 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.167000 audit[7108]: CRED_DISP pid=7108 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.202.177:22-139.178.68.195:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:21.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.202.177:22-139.178.68.195:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:21.249000 audit[7131]: USER_ACCT pid=7131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.250000 audit[7131]: CRED_ACQ pid=7131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.250000 audit[7131]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa7c455a0 a2=3 a3=0 items=0 ppid=1 pid=7131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:21.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:21.256000 audit[7131]: USER_START pid=7131 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.256000 audit[7133]: CRED_ACQ pid=7133 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.333000 audit[7131]: USER_END pid=7131 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.333000 audit[7131]: CRED_DISP pid=7131 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:21.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.202.177:22-139.178.68.195:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:21.822000 audit[5352]: AVC avc: denied { watch } for pid=5352 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.374061659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c572 tclass=file permissive=0 Dec 13 03:48:21.822000 audit[5352]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002176a40 a2=fc6 a3=0 items=0 ppid=4666 pid=5352 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c572 key=(null) Dec 13 03:48:21.822000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:48:25.746000 audit[5523]: AVC avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:48:25.788913 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 03:48:25.788988 kernel: audit: type=1400 audit(1734061705.746:1501): avc: denied { watch } for pid=5523 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_42_04.379699141/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c188,c936 tclass=file permissive=0 Dec 13 03:48:25.746000 audit[5523]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001708b80 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:48:26.004612 kernel: audit: type=1300 audit(1734061705.746:1501): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001708b80 a2=fc6 a3=0 items=0 ppid=5246 pid=5523 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c936 key=(null) Dec 13 03:48:26.004698 kernel: audit: type=1327 audit(1734061705.746:1501): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:48:25.746000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:48:26.344059 systemd[1]: Started sshd@24-147.75.202.177:22-139.178.68.195:40108.service. Dec 13 03:48:26.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.202.177:22-139.178.68.195:40108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:26.435448 kernel: audit: type=1130 audit(1734061706.342:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.202.177:22-139.178.68.195:40108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:26.459000 audit[7162]: USER_ACCT pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.460730 sshd[7162]: Accepted publickey for core from 139.178.68.195 port 40108 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:26.462151 sshd[7162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:26.464585 systemd-logind[1593]: New session 18 of user core. Dec 13 03:48:26.465235 systemd[1]: Started session-18.scope. Dec 13 03:48:26.460000 audit[7162]: CRED_ACQ pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.554806 sshd[7162]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:26.556147 systemd[1]: sshd@24-147.75.202.177:22-139.178.68.195:40108.service: Deactivated successfully. Dec 13 03:48:26.556579 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 03:48:26.556946 systemd-logind[1593]: Session 18 logged out. Waiting for processes to exit. Dec 13 03:48:26.557350 systemd-logind[1593]: Removed session 18. Dec 13 03:48:26.643112 kernel: audit: type=1101 audit(1734061706.459:1503): pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.643150 kernel: audit: type=1103 audit(1734061706.460:1504): pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.643168 kernel: audit: type=1006 audit(1734061706.460:1505): pid=7162 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 03:48:26.702104 kernel: audit: type=1300 audit(1734061706.460:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff126682c0 a2=3 a3=0 items=0 ppid=1 pid=7162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:26.460000 audit[7162]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff126682c0 a2=3 a3=0 items=0 ppid=1 pid=7162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:26.794731 kernel: audit: type=1327 audit(1734061706.460:1505): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:26.460000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:26.825479 kernel: audit: type=1105 audit(1734061706.466:1506): pid=7162 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.466000 audit[7162]: USER_START pid=7162 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.466000 audit[7164]: CRED_ACQ pid=7164 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.554000 audit[7162]: USER_END pid=7162 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.554000 audit[7162]: CRED_DISP pid=7162 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:26.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.202.177:22-139.178.68.195:40108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:30.268000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.268000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013121e0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:30.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:30.268000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.268000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f59560 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:30.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0102a5fb0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0048c5bc0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c008ee60c0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0109e1b90 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c008ee60e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:30.463000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c007ba98c0 a2=fc6 a3=0 items=0 ppid=2283 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c140,c741 key=(null) Dec 13 03:48:30.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230322E313737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 03:48:31.564268 systemd[1]: Started sshd@25-147.75.202.177:22-139.178.68.195:40112.service. Dec 13 03:48:31.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.202.177:22-139.178.68.195:40112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:31.591429 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 03:48:31.591504 kernel: audit: type=1130 audit(1734061711.563:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.202.177:22-139.178.68.195:40112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:31.705000 audit[7186]: USER_ACCT pid=7186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.706903 sshd[7186]: Accepted publickey for core from 139.178.68.195 port 40112 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:31.708465 sshd[7186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:31.710764 systemd-logind[1593]: New session 19 of user core. Dec 13 03:48:31.711349 systemd[1]: Started session-19.scope. Dec 13 03:48:31.790783 sshd[7186]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:31.792040 systemd[1]: sshd@25-147.75.202.177:22-139.178.68.195:40112.service: Deactivated successfully. Dec 13 03:48:31.792479 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 03:48:31.792833 systemd-logind[1593]: Session 19 logged out. Waiting for processes to exit. Dec 13 03:48:31.793256 systemd-logind[1593]: Removed session 19. Dec 13 03:48:31.706000 audit[7186]: CRED_ACQ pid=7186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.889463 kernel: audit: type=1101 audit(1734061711.705:1520): pid=7186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.889542 kernel: audit: type=1103 audit(1734061711.706:1521): pid=7186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.889563 kernel: audit: type=1006 audit(1734061711.706:1522): pid=7186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 03:48:31.948274 kernel: audit: type=1300 audit(1734061711.706:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd450c1290 a2=3 a3=0 items=0 ppid=1 pid=7186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:31.706000 audit[7186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd450c1290 a2=3 a3=0 items=0 ppid=1 pid=7186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:32.040560 kernel: audit: type=1327 audit(1734061711.706:1522): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:31.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:32.071175 kernel: audit: type=1105 audit(1734061711.712:1523): pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.712000 audit[7186]: USER_START pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:32.166198 kernel: audit: type=1103 audit(1734061711.712:1524): pid=7188 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.712000 audit[7188]: CRED_ACQ pid=7188 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:32.255782 kernel: audit: type=1106 audit(1734061711.789:1525): pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.789000 audit[7186]: USER_END pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.790000 audit[7186]: CRED_DISP pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:32.441276 kernel: audit: type=1104 audit(1734061711.790:1526): pid=7186 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:31.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.202.177:22-139.178.68.195:40112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:36.800586 systemd[1]: Started sshd@26-147.75.202.177:22-139.178.68.195:46792.service. Dec 13 03:48:36.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.202.177:22-139.178.68.195:46792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:36.827597 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:48:36.827674 kernel: audit: type=1130 audit(1734061716.799:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.202.177:22-139.178.68.195:46792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:36.942000 audit[7227]: USER_ACCT pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:36.943816 sshd[7227]: Accepted publickey for core from 139.178.68.195 port 46792 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:36.944656 sshd[7227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:36.947036 systemd-logind[1593]: New session 20 of user core. Dec 13 03:48:36.947722 systemd[1]: Started session-20.scope. Dec 13 03:48:36.943000 audit[7227]: CRED_ACQ pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.125765 kernel: audit: type=1101 audit(1734061716.942:1529): pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.125802 kernel: audit: type=1103 audit(1734061716.943:1530): pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.125821 kernel: audit: type=1006 audit(1734061716.943:1531): pid=7227 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 03:48:36.943000 audit[7227]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcaa36650 a2=3 a3=0 items=0 ppid=1 pid=7227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:37.275992 kernel: audit: type=1300 audit(1734061716.943:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcaa36650 a2=3 a3=0 items=0 ppid=1 pid=7227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:37.276064 kernel: audit: type=1327 audit(1734061716.943:1531): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:36.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:37.276282 sshd[7227]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:37.277776 systemd[1]: sshd@26-147.75.202.177:22-139.178.68.195:46792.service: Deactivated successfully. Dec 13 03:48:37.278218 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 03:48:37.278605 systemd-logind[1593]: Session 20 logged out. Waiting for processes to exit. Dec 13 03:48:37.279140 systemd-logind[1593]: Removed session 20. Dec 13 03:48:37.306635 kernel: audit: type=1105 audit(1734061716.948:1532): pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:36.948000 audit[7227]: USER_START pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.401683 kernel: audit: type=1103 audit(1734061716.949:1533): pid=7229 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:36.949000 audit[7229]: CRED_ACQ pid=7229 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.490907 kernel: audit: type=1106 audit(1734061717.275:1534): pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.275000 audit[7227]: USER_END pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.586414 kernel: audit: type=1104 audit(1734061717.275:1535): pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.275000 audit[7227]: CRED_DISP pid=7227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:37.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.202.177:22-139.178.68.195:46792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.228334 systemd[1]: Started sshd@27-147.75.202.177:22-139.178.68.195:46800.service. Dec 13 03:48:42.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.202.177:22-139.178.68.195:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.255752 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:48:42.255813 kernel: audit: type=1130 audit(1734061722.227:1537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.202.177:22-139.178.68.195:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.369000 audit[7276]: USER_ACCT pid=7276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.370980 sshd[7276]: Accepted publickey for core from 139.178.68.195 port 46800 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:42.372457 sshd[7276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:42.375023 systemd-logind[1593]: New session 21 of user core. Dec 13 03:48:42.375604 systemd[1]: Started session-21.scope. Dec 13 03:48:42.453720 sshd[7276]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:42.455569 systemd[1]: sshd@27-147.75.202.177:22-139.178.68.195:46800.service: Deactivated successfully. Dec 13 03:48:42.455914 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 03:48:42.456220 systemd-logind[1593]: Session 21 logged out. Waiting for processes to exit. Dec 13 03:48:42.456907 systemd[1]: Started sshd@28-147.75.202.177:22-139.178.68.195:46810.service. Dec 13 03:48:42.457312 systemd-logind[1593]: Removed session 21. Dec 13 03:48:42.370000 audit[7276]: CRED_ACQ pid=7276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.552686 kernel: audit: type=1101 audit(1734061722.369:1538): pid=7276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.552727 kernel: audit: type=1103 audit(1734061722.370:1539): pid=7276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.552746 kernel: audit: type=1006 audit(1734061722.370:1540): pid=7276 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 03:48:42.611325 kernel: audit: type=1300 audit(1734061722.370:1540): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfbf1d50 a2=3 a3=0 items=0 ppid=1 pid=7276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:42.370000 audit[7276]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfbf1d50 a2=3 a3=0 items=0 ppid=1 pid=7276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:42.636404 sshd[7300]: Accepted publickey for core from 139.178.68.195 port 46810 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:42.638149 sshd[7300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:42.640578 systemd-logind[1593]: New session 22 of user core. Dec 13 03:48:42.641050 systemd[1]: Started session-22.scope. Dec 13 03:48:42.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:42.733843 kernel: audit: type=1327 audit(1734061722.370:1540): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:42.733906 kernel: audit: type=1105 audit(1734061722.376:1541): pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.376000 audit[7276]: USER_START pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.748622 sshd[7300]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:42.750490 systemd[1]: sshd@28-147.75.202.177:22-139.178.68.195:46810.service: Deactivated successfully. Dec 13 03:48:42.750819 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 03:48:42.751135 systemd-logind[1593]: Session 22 logged out. Waiting for processes to exit. Dec 13 03:48:42.751731 systemd[1]: Started sshd@29-147.75.202.177:22-139.178.68.195:46820.service. Dec 13 03:48:42.752130 systemd-logind[1593]: Removed session 22. Dec 13 03:48:42.828347 kernel: audit: type=1103 audit(1734061722.377:1542): pid=7278 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.377000 audit[7278]: CRED_ACQ pid=7278 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.917495 kernel: audit: type=1106 audit(1734061722.453:1543): pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.453000 audit[7276]: USER_END pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.942681 sshd[7321]: Accepted publickey for core from 139.178.68.195 port 46820 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:42.946685 sshd[7321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:42.949215 systemd-logind[1593]: New session 23 of user core. Dec 13 03:48:42.949664 systemd[1]: Started session-23.scope. Dec 13 03:48:43.012904 kernel: audit: type=1104 audit(1734061722.453:1544): pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.453000 audit[7276]: CRED_DISP pid=7276 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.202.177:22-139.178.68.195:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.202.177:22-139.178.68.195:46810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.634000 audit[7300]: USER_ACCT pid=7300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.636000 audit[7300]: CRED_ACQ pid=7300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.636000 audit[7300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffded141d70 a2=3 a3=0 items=0 ppid=1 pid=7300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:42.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:42.641000 audit[7300]: USER_START pid=7300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.642000 audit[7302]: CRED_ACQ pid=7302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.747000 audit[7300]: USER_END pid=7300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.748000 audit[7300]: CRED_DISP pid=7300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.202.177:22-139.178.68.195:46810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.202.177:22-139.178.68.195:46820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:42.941000 audit[7321]: USER_ACCT pid=7321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.945000 audit[7321]: CRED_ACQ pid=7321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.945000 audit[7321]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffee0982f0 a2=3 a3=0 items=0 ppid=1 pid=7321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:42.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:42.950000 audit[7321]: USER_START pid=7321 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:42.951000 audit[7323]: CRED_ACQ pid=7323 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.093000 audit[7375]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=7375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.093000 audit[7375]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffb51baa10 a2=0 a3=7fffb51ba9fc items=0 ppid=2869 pid=7375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.103000 audit[7375]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=7375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.103000 audit[7375]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffb51baa10 a2=0 a3=0 items=0 ppid=2869 pid=7375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.106624 sshd[7321]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:44.106000 audit[7321]: USER_END pid=7321 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.106000 audit[7321]: CRED_DISP pid=7321 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.109284 systemd[1]: sshd@29-147.75.202.177:22-139.178.68.195:46820.service: Deactivated successfully. Dec 13 03:48:44.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.202.177:22-139.178.68.195:46820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:44.109895 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 03:48:44.110544 systemd-logind[1593]: Session 23 logged out. Waiting for processes to exit. Dec 13 03:48:44.111728 systemd[1]: Started sshd@30-147.75.202.177:22-139.178.68.195:46828.service. Dec 13 03:48:44.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.202.177:22-139.178.68.195:46828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:44.112522 systemd-logind[1593]: Removed session 23. Dec 13 03:48:44.118000 audit[7382]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=7382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.118000 audit[7382]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc9a8319e0 a2=0 a3=7ffc9a8319cc items=0 ppid=2869 pid=7382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.131000 audit[7382]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=7382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:44.131000 audit[7382]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc9a8319e0 a2=0 a3=0 items=0 ppid=2869 pid=7382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:44.161000 audit[7380]: USER_ACCT pid=7380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.162563 sshd[7380]: Accepted publickey for core from 139.178.68.195 port 46828 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:44.161000 audit[7380]: CRED_ACQ pid=7380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.161000 audit[7380]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea3fa3e40 a2=3 a3=0 items=0 ppid=1 pid=7380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.161000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:44.163599 sshd[7380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:44.166915 systemd-logind[1593]: New session 24 of user core. Dec 13 03:48:44.167633 systemd[1]: Started session-24.scope. Dec 13 03:48:44.170000 audit[7380]: USER_START pid=7380 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.171000 audit[7385]: CRED_ACQ pid=7385 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.349307 sshd[7380]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:44.348000 audit[7380]: USER_END pid=7380 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.348000 audit[7380]: CRED_DISP pid=7380 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.351059 systemd[1]: sshd@30-147.75.202.177:22-139.178.68.195:46828.service: Deactivated successfully. Dec 13 03:48:44.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.202.177:22-139.178.68.195:46828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:44.351410 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 03:48:44.351776 systemd-logind[1593]: Session 24 logged out. Waiting for processes to exit. Dec 13 03:48:44.352381 systemd[1]: Started sshd@31-147.75.202.177:22-139.178.68.195:46842.service. Dec 13 03:48:44.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.202.177:22-139.178.68.195:46842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:44.352972 systemd-logind[1593]: Removed session 24. Dec 13 03:48:44.381000 audit[7406]: USER_ACCT pid=7406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.383543 sshd[7406]: Accepted publickey for core from 139.178.68.195 port 46842 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:44.382000 audit[7406]: CRED_ACQ pid=7406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.382000 audit[7406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3566a290 a2=3 a3=0 items=0 ppid=1 pid=7406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:44.382000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:44.384182 sshd[7406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:44.386895 systemd-logind[1593]: New session 25 of user core. Dec 13 03:48:44.387447 systemd[1]: Started session-25.scope. Dec 13 03:48:44.388000 audit[7406]: USER_START pid=7406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.389000 audit[7408]: CRED_ACQ pid=7408 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.520394 sshd[7406]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:44.519000 audit[7406]: USER_END pid=7406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.519000 audit[7406]: CRED_DISP pid=7406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:44.522027 systemd[1]: sshd@31-147.75.202.177:22-139.178.68.195:46842.service: Deactivated successfully. Dec 13 03:48:44.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.202.177:22-139.178.68.195:46842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:44.522499 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 03:48:44.522928 systemd-logind[1593]: Session 25 logged out. Waiting for processes to exit. Dec 13 03:48:44.523342 systemd-logind[1593]: Removed session 25. Dec 13 03:48:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b97200 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7a240 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00003c220 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:46.253000 audit[2452]: AVC avc: denied { watch } for pid=2452 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:48:46.253000 audit[2452]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e29ec0 a2=fc6 a3=0 items=0 ppid=2309 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c113 key=(null) Dec 13 03:48:46.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:48:48.901000 audit[7433]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=7433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:48.930050 kernel: kauditd_printk_skb: 69 callbacks suppressed Dec 13 03:48:48.930124 kernel: audit: type=1325 audit(1734061728.901:1590): table=filter:125 family=2 entries=20 op=nft_register_rule pid=7433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:48.901000 audit[7433]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff15c002f0 a2=0 a3=7fff15c002dc items=0 ppid=2869 pid=7433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.989389 kernel: audit: type=1300 audit(1734061728.901:1590): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff15c002f0 a2=0 a3=7fff15c002dc items=0 ppid=2869 pid=7433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:49.143396 kernel: audit: type=1327 audit(1734061728.901:1590): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:49.143451 kernel: audit: type=1325 audit(1734061728.989:1591): table=nat:126 family=2 entries=106 op=nft_register_chain pid=7433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:48.989000 audit[7433]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=7433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:48:49.203105 kernel: audit: type=1300 audit(1734061728.989:1591): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff15c002f0 a2=0 a3=7fff15c002dc items=0 ppid=2869 pid=7433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:48.989000 audit[7433]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff15c002f0 a2=0 a3=7fff15c002dc items=0 ppid=2869 pid=7433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:49.301208 kernel: audit: type=1327 audit(1734061728.989:1591): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:48.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:48:49.530136 systemd[1]: Started sshd@32-147.75.202.177:22-139.178.68.195:42798.service. Dec 13 03:48:49.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.202.177:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:49.621409 kernel: audit: type=1130 audit(1734061729.528:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.202.177:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:49.644000 audit[7436]: USER_ACCT pid=7436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.646195 sshd[7436]: Accepted publickey for core from 139.178.68.195 port 42798 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:49.647882 sshd[7436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:49.650394 systemd-logind[1593]: New session 26 of user core. Dec 13 03:48:49.651089 systemd[1]: Started session-26.scope. Dec 13 03:48:49.729132 sshd[7436]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:49.730582 systemd[1]: sshd@32-147.75.202.177:22-139.178.68.195:42798.service: Deactivated successfully. Dec 13 03:48:49.731014 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 03:48:49.731282 systemd-logind[1593]: Session 26 logged out. Waiting for processes to exit. Dec 13 03:48:49.731714 systemd-logind[1593]: Removed session 26. Dec 13 03:48:49.646000 audit[7436]: CRED_ACQ pid=7436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.830098 kernel: audit: type=1101 audit(1734061729.644:1593): pid=7436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.830136 kernel: audit: type=1103 audit(1734061729.646:1594): pid=7436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.830155 kernel: audit: type=1006 audit(1734061729.646:1595): pid=7436 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 03:48:49.646000 audit[7436]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc5e5980 a2=3 a3=0 items=0 ppid=1 pid=7436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:49.646000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:49.652000 audit[7436]: USER_START pid=7436 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.652000 audit[7438]: CRED_ACQ pid=7438 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.728000 audit[7436]: USER_END pid=7436 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.728000 audit[7436]: CRED_DISP pid=7436 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:49.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.202.177:22-139.178.68.195:42798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:54.734108 systemd[1]: Started sshd@33-147.75.202.177:22-139.178.68.195:42808.service. Dec 13 03:48:54.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.202.177:22-139.178.68.195:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:54.761516 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 03:48:54.761584 kernel: audit: type=1130 audit(1734061734.732:1601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.202.177:22-139.178.68.195:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:54.876000 audit[7460]: USER_ACCT pid=7460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.878067 sshd[7460]: Accepted publickey for core from 139.178.68.195 port 42808 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:48:54.879663 sshd[7460]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:48:54.882035 systemd-logind[1593]: New session 27 of user core. Dec 13 03:48:54.882557 systemd[1]: Started session-27.scope. Dec 13 03:48:54.960173 sshd[7460]: pam_unix(sshd:session): session closed for user core Dec 13 03:48:54.961580 systemd[1]: sshd@33-147.75.202.177:22-139.178.68.195:42808.service: Deactivated successfully. Dec 13 03:48:54.962004 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 03:48:54.962272 systemd-logind[1593]: Session 27 logged out. Waiting for processes to exit. Dec 13 03:48:54.962875 systemd-logind[1593]: Removed session 27. Dec 13 03:48:54.878000 audit[7460]: CRED_ACQ pid=7460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.060978 kernel: audit: type=1101 audit(1734061734.876:1602): pid=7460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.061017 kernel: audit: type=1103 audit(1734061734.878:1603): pid=7460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.061035 kernel: audit: type=1006 audit(1734061734.878:1604): pid=7460 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 03:48:54.878000 audit[7460]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc85d62170 a2=3 a3=0 items=0 ppid=1 pid=7460 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:55.212943 kernel: audit: type=1300 audit(1734061734.878:1604): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc85d62170 a2=3 a3=0 items=0 ppid=1 pid=7460 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:48:55.212978 kernel: audit: type=1327 audit(1734061734.878:1604): proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:54.878000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:48:55.243779 kernel: audit: type=1105 audit(1734061734.883:1605): pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.883000 audit[7460]: USER_START pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.339081 kernel: audit: type=1103 audit(1734061734.884:1606): pid=7462 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.884000 audit[7462]: CRED_ACQ pid=7462 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.428571 kernel: audit: type=1106 audit(1734061734.959:1607): pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.959000 audit[7460]: USER_END pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.959000 audit[7460]: CRED_DISP pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:55.615245 kernel: audit: type=1104 audit(1734061734.959:1608): pid=7460 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:48:54.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.202.177:22-139.178.68.195:42808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:48:59.970215 systemd[1]: Started sshd@34-147.75.202.177:22-139.178.68.195:56742.service. Dec 13 03:48:59.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.202.177:22-139.178.68.195:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:49:00.087426 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:49:00.087465 kernel: audit: type=1130 audit(1734061739.968:1610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.202.177:22-139.178.68.195:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:49:00.119685 sshd[7503]: Accepted publickey for core from 139.178.68.195 port 56742 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:49:00.119000 audit[7503]: USER_ACCT pid=7503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.121677 sshd[7503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:49:00.124003 systemd-logind[1593]: New session 28 of user core. Dec 13 03:49:00.124596 systemd[1]: Started session-28.scope. Dec 13 03:49:00.201828 sshd[7503]: pam_unix(sshd:session): session closed for user core Dec 13 03:49:00.203200 systemd[1]: sshd@34-147.75.202.177:22-139.178.68.195:56742.service: Deactivated successfully. Dec 13 03:49:00.203644 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 03:49:00.204034 systemd-logind[1593]: Session 28 logged out. Waiting for processes to exit. Dec 13 03:49:00.204463 systemd-logind[1593]: Removed session 28. Dec 13 03:49:00.120000 audit[7503]: CRED_ACQ pid=7503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.302465 kernel: audit: type=1101 audit(1734061740.119:1611): pid=7503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.302526 kernel: audit: type=1103 audit(1734061740.120:1612): pid=7503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.302562 kernel: audit: type=1006 audit(1734061740.120:1613): pid=7503 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 03:49:00.120000 audit[7503]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f6d4f60 a2=3 a3=0 items=0 ppid=1 pid=7503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:00.453165 kernel: audit: type=1300 audit(1734061740.120:1613): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f6d4f60 a2=3 a3=0 items=0 ppid=1 pid=7503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:00.453228 kernel: audit: type=1327 audit(1734061740.120:1613): proctitle=737368643A20636F7265205B707269765D Dec 13 03:49:00.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:49:00.125000 audit[7503]: USER_START pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.578208 kernel: audit: type=1105 audit(1734061740.125:1614): pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.578282 kernel: audit: type=1103 audit(1734061740.126:1615): pid=7505 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.126000 audit[7505]: CRED_ACQ pid=7505 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.201000 audit[7503]: USER_END pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.762928 kernel: audit: type=1106 audit(1734061740.201:1616): pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.763007 kernel: audit: type=1104 audit(1734061740.201:1617): pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.201000 audit[7503]: CRED_DISP pid=7503 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:00.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.202.177:22-139.178.68.195:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:49:05.211225 systemd[1]: Started sshd@35-147.75.202.177:22-139.178.68.195:56748.service. Dec 13 03:49:05.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.202.177:22-139.178.68.195:56748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:49:05.238119 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:49:05.238222 kernel: audit: type=1130 audit(1734061745.209:1619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.202.177:22-139.178.68.195:56748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:49:05.353772 sshd[7527]: Accepted publickey for core from 139.178.68.195 port 56748 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 03:49:05.353000 audit[7527]: USER_ACCT pid=7527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.354700 sshd[7527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:49:05.357216 systemd-logind[1593]: New session 29 of user core. Dec 13 03:49:05.357747 systemd[1]: Started session-29.scope. Dec 13 03:49:05.434230 sshd[7527]: pam_unix(sshd:session): session closed for user core Dec 13 03:49:05.435778 systemd[1]: sshd@35-147.75.202.177:22-139.178.68.195:56748.service: Deactivated successfully. Dec 13 03:49:05.436213 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 03:49:05.436612 systemd-logind[1593]: Session 29 logged out. Waiting for processes to exit. Dec 13 03:49:05.437167 systemd-logind[1593]: Removed session 29. Dec 13 03:49:05.353000 audit[7527]: CRED_ACQ pid=7527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.535649 kernel: audit: type=1101 audit(1734061745.353:1620): pid=7527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.535732 kernel: audit: type=1103 audit(1734061745.353:1621): pid=7527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.535771 kernel: audit: type=1006 audit(1734061745.353:1622): pid=7527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 03:49:05.353000 audit[7527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc947cc970 a2=3 a3=0 items=0 ppid=1 pid=7527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:05.686303 kernel: audit: type=1300 audit(1734061745.353:1622): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc947cc970 a2=3 a3=0 items=0 ppid=1 pid=7527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:49:05.686368 kernel: audit: type=1327 audit(1734061745.353:1622): proctitle=737368643A20636F7265205B707269765D Dec 13 03:49:05.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:49:05.358000 audit[7527]: USER_START pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.811457 kernel: audit: type=1105 audit(1734061745.358:1623): pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.811529 kernel: audit: type=1103 audit(1734061745.359:1624): pid=7529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.359000 audit[7529]: CRED_ACQ pid=7529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.434000 audit[7527]: USER_END pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.996233 kernel: audit: type=1106 audit(1734061745.434:1625): pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.996316 kernel: audit: type=1104 audit(1734061745.434:1626): pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.434000 audit[7527]: CRED_DISP pid=7527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 03:49:05.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.202.177:22-139.178.68.195:56748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'