Dec 13 02:24:02.569717 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:24:02.569730 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:24:02.569737 kernel: BIOS-provided physical RAM map: Dec 13 02:24:02.569741 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 02:24:02.569744 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 02:24:02.569748 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 02:24:02.569753 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 02:24:02.569756 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 02:24:02.569760 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b25fff] usable Dec 13 02:24:02.569764 kernel: BIOS-e820: [mem 0x0000000081b26000-0x0000000081b26fff] ACPI NVS Dec 13 02:24:02.569768 kernel: BIOS-e820: [mem 0x0000000081b27000-0x0000000081b27fff] reserved Dec 13 02:24:02.569772 kernel: BIOS-e820: [mem 0x0000000081b28000-0x000000008afccfff] usable Dec 13 02:24:02.569776 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 02:24:02.569780 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 02:24:02.569785 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 02:24:02.569790 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 02:24:02.569794 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 02:24:02.569798 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 02:24:02.569802 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 02:24:02.569806 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 02:24:02.569810 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 02:24:02.569814 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 02:24:02.569818 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 02:24:02.569822 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 02:24:02.569826 kernel: NX (Execute Disable) protection: active Dec 13 02:24:02.569831 kernel: SMBIOS 3.2.1 present. Dec 13 02:24:02.569836 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 02:24:02.569840 kernel: tsc: Detected 3400.000 MHz processor Dec 13 02:24:02.569844 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 02:24:02.569848 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:24:02.569853 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:24:02.569857 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 02:24:02.569861 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:24:02.569866 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 02:24:02.569870 kernel: Using GB pages for direct mapping Dec 13 02:24:02.569874 kernel: ACPI: Early table checksum verification disabled Dec 13 02:24:02.569879 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 02:24:02.569883 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 02:24:02.569887 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 02:24:02.569892 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 02:24:02.569898 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 02:24:02.569902 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 02:24:02.569908 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 02:24:02.569912 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 02:24:02.569917 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 02:24:02.569921 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 02:24:02.569926 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 02:24:02.569931 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 02:24:02.569935 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 02:24:02.569940 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 02:24:02.569945 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 02:24:02.569950 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 02:24:02.569954 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 02:24:02.569959 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 02:24:02.569963 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 02:24:02.569968 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 02:24:02.569973 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 02:24:02.569977 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 02:24:02.569982 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 02:24:02.569987 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 02:24:02.569992 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 02:24:02.569996 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 02:24:02.570001 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 02:24:02.570005 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 02:24:02.570010 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 02:24:02.570014 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 02:24:02.570019 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 02:24:02.570024 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 02:24:02.570029 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 02:24:02.570033 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 02:24:02.570038 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 02:24:02.570042 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 02:24:02.570047 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 02:24:02.570052 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 02:24:02.570056 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 02:24:02.570061 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 02:24:02.570066 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 02:24:02.570070 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 02:24:02.570075 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 02:24:02.570079 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 02:24:02.570084 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 02:24:02.570088 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 02:24:02.570093 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 02:24:02.570098 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 02:24:02.570103 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 02:24:02.570107 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 02:24:02.570112 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 02:24:02.570117 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 02:24:02.570121 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 02:24:02.570126 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 02:24:02.570130 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 02:24:02.570135 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 02:24:02.570139 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 02:24:02.570145 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 02:24:02.570149 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 02:24:02.570154 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 02:24:02.570158 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 02:24:02.570163 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 02:24:02.570167 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 02:24:02.570172 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 02:24:02.570176 kernel: No NUMA configuration found Dec 13 02:24:02.570181 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 02:24:02.570186 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 02:24:02.570191 kernel: Zone ranges: Dec 13 02:24:02.570195 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:24:02.570200 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:24:02.570204 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 02:24:02.570209 kernel: Movable zone start for each node Dec 13 02:24:02.570214 kernel: Early memory node ranges Dec 13 02:24:02.570218 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 02:24:02.570223 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 02:24:02.570227 kernel: node 0: [mem 0x0000000040400000-0x0000000081b25fff] Dec 13 02:24:02.570233 kernel: node 0: [mem 0x0000000081b28000-0x000000008afccfff] Dec 13 02:24:02.570237 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 02:24:02.570242 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 02:24:02.570246 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 02:24:02.570251 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 02:24:02.570255 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:24:02.570263 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 02:24:02.570268 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 02:24:02.570273 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 02:24:02.570278 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 02:24:02.570284 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 02:24:02.570289 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 02:24:02.570294 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 02:24:02.570299 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 02:24:02.570304 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 02:24:02.570308 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 02:24:02.570313 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 02:24:02.570319 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 02:24:02.570324 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 02:24:02.570329 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 02:24:02.570333 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 02:24:02.570338 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 02:24:02.570343 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 02:24:02.570348 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 02:24:02.570353 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 02:24:02.570357 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 02:24:02.570363 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 02:24:02.570387 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 02:24:02.570392 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 02:24:02.570397 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 02:24:02.570402 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 02:24:02.570407 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 02:24:02.570412 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:24:02.570417 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:24:02.570436 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:24:02.570442 kernel: TSC deadline timer available Dec 13 02:24:02.570447 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 02:24:02.570452 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 02:24:02.570457 kernel: Booting paravirtualized kernel on bare hardware Dec 13 02:24:02.570462 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:24:02.570467 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 02:24:02.570472 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 02:24:02.570477 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 02:24:02.570481 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 02:24:02.570487 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 02:24:02.570492 kernel: Policy zone: Normal Dec 13 02:24:02.570497 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:24:02.570502 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:24:02.570507 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 02:24:02.570512 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 02:24:02.570517 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:24:02.570523 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 730116K reserved, 0K cma-reserved) Dec 13 02:24:02.570528 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 02:24:02.570533 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:24:02.570538 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:24:02.570542 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:24:02.570548 kernel: rcu: RCU event tracing is enabled. Dec 13 02:24:02.570553 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 02:24:02.570558 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:24:02.570562 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:24:02.570568 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:24:02.570573 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 02:24:02.570578 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 02:24:02.570583 kernel: random: crng init done Dec 13 02:24:02.570587 kernel: Console: colour dummy device 80x25 Dec 13 02:24:02.570592 kernel: printk: console [tty0] enabled Dec 13 02:24:02.570597 kernel: printk: console [ttyS1] enabled Dec 13 02:24:02.570602 kernel: ACPI: Core revision 20210730 Dec 13 02:24:02.570607 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 02:24:02.570612 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:24:02.570618 kernel: DMAR: Host address width 39 Dec 13 02:24:02.570622 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 02:24:02.570627 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 02:24:02.570632 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 02:24:02.570637 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 02:24:02.570642 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 02:24:02.570647 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 02:24:02.570652 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 02:24:02.570657 kernel: x2apic enabled Dec 13 02:24:02.570662 kernel: Switched APIC routing to cluster x2apic. Dec 13 02:24:02.570667 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 02:24:02.570672 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 02:24:02.570677 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 02:24:02.570682 kernel: process: using mwait in idle threads Dec 13 02:24:02.570687 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:24:02.570691 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:24:02.570696 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:24:02.570701 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 02:24:02.570707 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:24:02.570712 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:24:02.570716 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 02:24:02.570721 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:24:02.570726 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 02:24:02.570731 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 02:24:02.570735 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:24:02.570740 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:24:02.570745 kernel: TAA: Mitigation: TSX disabled Dec 13 02:24:02.570750 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 02:24:02.570755 kernel: SRBDS: Mitigation: Microcode Dec 13 02:24:02.570761 kernel: GDS: Vulnerable: No microcode Dec 13 02:24:02.570765 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:24:02.570770 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:24:02.570775 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:24:02.570780 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 02:24:02.570785 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 02:24:02.570789 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:24:02.570794 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 02:24:02.570799 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 02:24:02.570804 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 02:24:02.570809 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:24:02.570814 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:24:02.570819 kernel: LSM: Security Framework initializing Dec 13 02:24:02.570824 kernel: SELinux: Initializing. Dec 13 02:24:02.570829 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:24:02.570833 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:24:02.570838 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 02:24:02.570843 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 02:24:02.570848 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 02:24:02.570853 kernel: ... version: 4 Dec 13 02:24:02.570858 kernel: ... bit width: 48 Dec 13 02:24:02.570863 kernel: ... generic registers: 4 Dec 13 02:24:02.570868 kernel: ... value mask: 0000ffffffffffff Dec 13 02:24:02.570873 kernel: ... max period: 00007fffffffffff Dec 13 02:24:02.570878 kernel: ... fixed-purpose events: 3 Dec 13 02:24:02.570883 kernel: ... event mask: 000000070000000f Dec 13 02:24:02.570888 kernel: signal: max sigframe size: 2032 Dec 13 02:24:02.570892 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:24:02.570897 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 02:24:02.570902 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:24:02.570907 kernel: x86: Booting SMP configuration: Dec 13 02:24:02.570913 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 02:24:02.570918 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:24:02.570923 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 02:24:02.570927 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 02:24:02.570932 kernel: smpboot: Max logical packages: 1 Dec 13 02:24:02.570937 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 02:24:02.570942 kernel: devtmpfs: initialized Dec 13 02:24:02.570947 kernel: x86/mm: Memory block size: 128MB Dec 13 02:24:02.570952 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b26000-0x81b26fff] (4096 bytes) Dec 13 02:24:02.570957 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 02:24:02.570962 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:24:02.570967 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 02:24:02.570972 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:24:02.570977 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:24:02.570982 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:24:02.570987 kernel: audit: type=2000 audit(1734056637.041:1): state=initialized audit_enabled=0 res=1 Dec 13 02:24:02.570991 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:24:02.570996 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:24:02.571002 kernel: cpuidle: using governor menu Dec 13 02:24:02.571007 kernel: ACPI: bus type PCI registered Dec 13 02:24:02.571011 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:24:02.571016 kernel: dca service started, version 1.12.1 Dec 13 02:24:02.571021 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 02:24:02.571026 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 02:24:02.571031 kernel: PCI: Using configuration type 1 for base access Dec 13 02:24:02.571036 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 02:24:02.571040 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:24:02.571046 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:24:02.571051 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:24:02.571056 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:24:02.571061 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:24:02.571065 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:24:02.571070 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:24:02.571075 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:24:02.571080 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:24:02.571085 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:24:02.571091 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 02:24:02.571095 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571100 kernel: ACPI: SSDT 0xFFFF9FB1C0218200 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 02:24:02.571105 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 02:24:02.571110 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571115 kernel: ACPI: SSDT 0xFFFF9FB1C1AE1800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 02:24:02.571120 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571125 kernel: ACPI: SSDT 0xFFFF9FB1C1A5E800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 02:24:02.571129 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571135 kernel: ACPI: SSDT 0xFFFF9FB1C1B49000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 02:24:02.571140 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571144 kernel: ACPI: SSDT 0xFFFF9FB1C014F000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 02:24:02.571149 kernel: ACPI: Dynamic OEM Table Load: Dec 13 02:24:02.571154 kernel: ACPI: SSDT 0xFFFF9FB1C1AE0C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 02:24:02.571159 kernel: ACPI: Interpreter enabled Dec 13 02:24:02.571164 kernel: ACPI: PM: (supports S0 S5) Dec 13 02:24:02.571169 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:24:02.571174 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 02:24:02.571179 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 02:24:02.571184 kernel: HEST: Table parsing has been initialized. Dec 13 02:24:02.571189 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 02:24:02.571194 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:24:02.571199 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 02:24:02.571204 kernel: ACPI: PM: Power Resource [USBC] Dec 13 02:24:02.571208 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 02:24:02.571213 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 02:24:02.571218 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 02:24:02.571223 kernel: ACPI: PM: Power Resource [WRST] Dec 13 02:24:02.571228 kernel: ACPI: PM: Power Resource [FN00] Dec 13 02:24:02.571233 kernel: ACPI: PM: Power Resource [FN01] Dec 13 02:24:02.571238 kernel: ACPI: PM: Power Resource [FN02] Dec 13 02:24:02.571243 kernel: ACPI: PM: Power Resource [FN03] Dec 13 02:24:02.571247 kernel: ACPI: PM: Power Resource [FN04] Dec 13 02:24:02.571252 kernel: ACPI: PM: Power Resource [PIN] Dec 13 02:24:02.571257 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 02:24:02.571322 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:24:02.571388 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 02:24:02.571444 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 02:24:02.571451 kernel: PCI host bridge to bus 0000:00 Dec 13 02:24:02.571494 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:24:02.571533 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:24:02.571570 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:24:02.571607 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 02:24:02.571647 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 02:24:02.571685 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 02:24:02.571735 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 02:24:02.571785 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 02:24:02.571829 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.571876 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 02:24:02.571920 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 02:24:02.571967 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 02:24:02.572011 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 02:24:02.572057 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 02:24:02.572100 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 02:24:02.572145 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 02:24:02.572192 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 02:24:02.572234 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 02:24:02.572276 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 02:24:02.572321 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 02:24:02.572364 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 02:24:02.572451 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 02:24:02.572495 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 02:24:02.572541 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 02:24:02.572583 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 02:24:02.572625 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 02:24:02.572671 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 02:24:02.572712 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 02:24:02.572755 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 02:24:02.572802 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 02:24:02.572845 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 02:24:02.572886 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 02:24:02.572931 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 02:24:02.572972 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 02:24:02.573016 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 02:24:02.573063 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 02:24:02.573107 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 02:24:02.573149 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 02:24:02.573191 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 02:24:02.573233 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 02:24:02.573279 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 02:24:02.573323 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.573370 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 02:24:02.573450 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.573499 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 02:24:02.573543 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.573589 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 02:24:02.573632 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.573680 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 02:24:02.573724 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.573771 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 02:24:02.573814 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 02:24:02.573861 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 02:24:02.573908 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 02:24:02.573949 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 02:24:02.573992 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 02:24:02.574039 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 02:24:02.574082 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 02:24:02.574132 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 02:24:02.574178 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 02:24:02.574222 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 02:24:02.574265 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 02:24:02.574309 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 02:24:02.574352 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 02:24:02.574446 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 02:24:02.574492 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 02:24:02.574536 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 02:24:02.574580 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 02:24:02.574624 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 02:24:02.574668 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 02:24:02.574711 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:24:02.574754 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 02:24:02.574798 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 02:24:02.574841 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 02:24:02.574889 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 02:24:02.574934 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 02:24:02.574977 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 02:24:02.575021 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 02:24:02.575065 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 02:24:02.575108 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.575153 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 02:24:02.575249 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 02:24:02.575292 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 02:24:02.575341 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 02:24:02.575388 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 02:24:02.575452 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 02:24:02.575496 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 02:24:02.575541 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 02:24:02.575585 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:24:02.575628 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 02:24:02.575671 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 02:24:02.575712 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 02:24:02.575755 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 02:24:02.575802 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 02:24:02.575847 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 02:24:02.575892 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 02:24:02.575936 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:24:02.575980 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 02:24:02.576022 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 02:24:02.576065 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 02:24:02.576113 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 02:24:02.576165 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 02:24:02.576213 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 02:24:02.576260 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 02:24:02.576306 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 02:24:02.576352 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:24:02.576422 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 02:24:02.576488 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:24:02.576533 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 02:24:02.576579 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 02:24:02.576623 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 02:24:02.576630 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 02:24:02.576636 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 02:24:02.576641 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 02:24:02.576646 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 02:24:02.576651 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 02:24:02.576657 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 02:24:02.576662 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 02:24:02.576668 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 02:24:02.576674 kernel: iommu: Default domain type: Translated Dec 13 02:24:02.576679 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:24:02.576723 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 02:24:02.576769 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:24:02.576815 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 02:24:02.576823 kernel: vgaarb: loaded Dec 13 02:24:02.576829 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:24:02.576835 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:24:02.576841 kernel: PTP clock support registered Dec 13 02:24:02.576846 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:24:02.576851 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:24:02.576856 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 02:24:02.576861 kernel: e820: reserve RAM buffer [mem 0x81b26000-0x83ffffff] Dec 13 02:24:02.576866 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 02:24:02.576871 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 02:24:02.576876 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 02:24:02.576882 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 02:24:02.576887 kernel: clocksource: Switched to clocksource tsc-early Dec 13 02:24:02.576892 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:24:02.576898 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:24:02.576903 kernel: pnp: PnP ACPI init Dec 13 02:24:02.576946 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 02:24:02.576989 kernel: pnp 00:02: [dma 0 disabled] Dec 13 02:24:02.577029 kernel: pnp 00:03: [dma 0 disabled] Dec 13 02:24:02.577074 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 02:24:02.577114 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 02:24:02.577155 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 02:24:02.577196 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 02:24:02.577234 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 02:24:02.577272 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 02:24:02.577311 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 02:24:02.577349 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 02:24:02.577414 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 02:24:02.577472 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 02:24:02.577511 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 02:24:02.577551 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 02:24:02.577590 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 02:24:02.577629 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 02:24:02.577667 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 02:24:02.577704 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 02:24:02.577741 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 02:24:02.577780 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 02:24:02.577820 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 02:24:02.577828 kernel: pnp: PnP ACPI: found 10 devices Dec 13 02:24:02.577834 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:24:02.577840 kernel: NET: Registered PF_INET protocol family Dec 13 02:24:02.577845 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:24:02.577850 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:24:02.577856 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:24:02.577861 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:24:02.577866 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:24:02.577871 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 02:24:02.577876 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 02:24:02.577882 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 02:24:02.577888 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:24:02.577893 kernel: NET: Registered PF_XDP protocol family Dec 13 02:24:02.577936 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 02:24:02.577979 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 02:24:02.578021 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 02:24:02.578065 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 02:24:02.578109 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 02:24:02.578155 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 02:24:02.578199 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 02:24:02.578241 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:24:02.578283 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 02:24:02.578326 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 02:24:02.578370 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 02:24:02.578461 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 02:24:02.578503 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 02:24:02.578547 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 02:24:02.578588 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 02:24:02.578631 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 02:24:02.578673 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 02:24:02.578715 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 02:24:02.578761 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 02:24:02.578804 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 02:24:02.578848 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 02:24:02.578891 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 02:24:02.578934 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 02:24:02.578976 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 02:24:02.579014 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 02:24:02.579052 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:24:02.579089 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:24:02.579128 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:24:02.579165 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 02:24:02.579202 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 02:24:02.579246 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 02:24:02.579286 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 02:24:02.579332 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 02:24:02.579396 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 02:24:02.579460 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 02:24:02.579499 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 02:24:02.579542 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 02:24:02.579581 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 02:24:02.579623 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 02:24:02.579664 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 02:24:02.579673 kernel: PCI: CLS 64 bytes, default 64 Dec 13 02:24:02.579679 kernel: DMAR: No ATSR found Dec 13 02:24:02.579684 kernel: DMAR: No SATC found Dec 13 02:24:02.579689 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 02:24:02.579730 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 02:24:02.579775 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 02:24:02.579817 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 02:24:02.579861 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 02:24:02.579904 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 02:24:02.579947 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 02:24:02.579988 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 02:24:02.580030 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 02:24:02.580071 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 02:24:02.580113 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 02:24:02.580155 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 02:24:02.580197 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 02:24:02.580238 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 02:24:02.580282 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 02:24:02.580323 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 02:24:02.580368 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 02:24:02.580433 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 02:24:02.580476 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 02:24:02.580518 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 02:24:02.580562 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 02:24:02.580604 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 02:24:02.580651 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 02:24:02.580695 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 02:24:02.580741 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 02:24:02.580785 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 02:24:02.580828 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 02:24:02.580876 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 02:24:02.580883 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 02:24:02.580889 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:24:02.580896 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 02:24:02.580901 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 02:24:02.580907 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 02:24:02.580912 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 02:24:02.580917 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 02:24:02.580962 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 02:24:02.580970 kernel: Initialise system trusted keyrings Dec 13 02:24:02.580975 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 02:24:02.580982 kernel: Key type asymmetric registered Dec 13 02:24:02.580987 kernel: Asymmetric key parser 'x509' registered Dec 13 02:24:02.580992 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:24:02.580998 kernel: io scheduler mq-deadline registered Dec 13 02:24:02.581003 kernel: io scheduler kyber registered Dec 13 02:24:02.581008 kernel: io scheduler bfq registered Dec 13 02:24:02.581051 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 02:24:02.581096 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 02:24:02.581140 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 02:24:02.581185 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 02:24:02.581229 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 02:24:02.581272 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 02:24:02.581320 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 02:24:02.581328 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 02:24:02.581333 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 02:24:02.581339 kernel: pstore: Registered erst as persistent store backend Dec 13 02:24:02.581345 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:24:02.581351 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:24:02.581356 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:24:02.581361 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:24:02.581369 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 02:24:02.581415 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 02:24:02.581423 kernel: i8042: PNP: No PS/2 controller found. Dec 13 02:24:02.581461 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 02:24:02.581503 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 02:24:02.581542 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T02:24:01 UTC (1734056641) Dec 13 02:24:02.581582 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 02:24:02.581589 kernel: fail to initialize ptp_kvm Dec 13 02:24:02.581595 kernel: intel_pstate: Intel P-state driver initializing Dec 13 02:24:02.581600 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 02:24:02.581605 kernel: intel_pstate: HWP enabled Dec 13 02:24:02.581611 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 02:24:02.581616 kernel: vesafb: scrolling: redraw Dec 13 02:24:02.581622 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 02:24:02.581628 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000ff1fcfba, using 768k, total 768k Dec 13 02:24:02.581633 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 02:24:02.581638 kernel: fb0: VESA VGA frame buffer device Dec 13 02:24:02.581644 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:24:02.581649 kernel: Segment Routing with IPv6 Dec 13 02:24:02.581654 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:24:02.581660 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:24:02.581665 kernel: Key type dns_resolver registered Dec 13 02:24:02.581671 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 02:24:02.581676 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 02:24:02.581681 kernel: IPI shorthand broadcast: enabled Dec 13 02:24:02.581687 kernel: sched_clock: Marking stable (1681577732, 1339862560)->(4465794167, -1444353875) Dec 13 02:24:02.581692 kernel: registered taskstats version 1 Dec 13 02:24:02.581697 kernel: Loading compiled-in X.509 certificates Dec 13 02:24:02.581703 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:24:02.581708 kernel: Key type .fscrypt registered Dec 13 02:24:02.581713 kernel: Key type fscrypt-provisioning registered Dec 13 02:24:02.581719 kernel: pstore: Using crash dump compression: deflate Dec 13 02:24:02.581724 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:24:02.581730 kernel: ima: No architecture policies found Dec 13 02:24:02.581735 kernel: clk: Disabling unused clocks Dec 13 02:24:02.581740 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:24:02.581745 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:24:02.581751 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:24:02.581756 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:24:02.581761 kernel: Run /init as init process Dec 13 02:24:02.581767 kernel: with arguments: Dec 13 02:24:02.581773 kernel: /init Dec 13 02:24:02.581778 kernel: with environment: Dec 13 02:24:02.581783 kernel: HOME=/ Dec 13 02:24:02.581788 kernel: TERM=linux Dec 13 02:24:02.581793 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:24:02.581800 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:24:02.581806 systemd[1]: Detected architecture x86-64. Dec 13 02:24:02.581813 systemd[1]: Running in initrd. Dec 13 02:24:02.581819 systemd[1]: No hostname configured, using default hostname. Dec 13 02:24:02.581824 systemd[1]: Hostname set to . Dec 13 02:24:02.581829 systemd[1]: Initializing machine ID from random generator. Dec 13 02:24:02.581835 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:24:02.581840 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:24:02.581846 systemd[1]: Reached target cryptsetup.target. Dec 13 02:24:02.581851 systemd[1]: Reached target paths.target. Dec 13 02:24:02.581857 systemd[1]: Reached target slices.target. Dec 13 02:24:02.581863 systemd[1]: Reached target swap.target. Dec 13 02:24:02.581868 systemd[1]: Reached target timers.target. Dec 13 02:24:02.581873 systemd[1]: Listening on iscsid.socket. Dec 13 02:24:02.581879 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:24:02.581885 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:24:02.581890 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:24:02.581896 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:24:02.581902 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Dec 13 02:24:02.581907 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Dec 13 02:24:02.581912 kernel: clocksource: Switched to clocksource tsc Dec 13 02:24:02.581918 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:24:02.581924 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:24:02.581929 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:24:02.581935 systemd[1]: Reached target sockets.target. Dec 13 02:24:02.581940 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:24:02.581946 systemd[1]: Finished network-cleanup.service. Dec 13 02:24:02.581952 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:24:02.581957 systemd[1]: Starting systemd-journald.service... Dec 13 02:24:02.581963 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:24:02.581972 systemd-journald[267]: Journal started Dec 13 02:24:02.581998 systemd-journald[267]: Runtime Journal (/run/log/journal/f97fc0478b1a484bb2cb08f7bc55173c) is 8.0M, max 640.1M, 632.1M free. Dec 13 02:24:02.583573 systemd-modules-load[268]: Inserted module 'overlay' Dec 13 02:24:02.612471 kernel: audit: type=1334 audit(1734056642.588:2): prog-id=6 op=LOAD Dec 13 02:24:02.612482 systemd[1]: Starting systemd-resolved.service... Dec 13 02:24:02.588000 audit: BPF prog-id=6 op=LOAD Dec 13 02:24:02.657408 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:24:02.657426 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:24:02.690405 kernel: Bridge firewalling registered Dec 13 02:24:02.690421 systemd[1]: Started systemd-journald.service. Dec 13 02:24:02.704137 systemd-modules-load[268]: Inserted module 'br_netfilter' Dec 13 02:24:02.752254 kernel: audit: type=1130 audit(1734056642.711:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.706630 systemd-resolved[270]: Positive Trust Anchors: Dec 13 02:24:02.827323 kernel: SCSI subsystem initialized Dec 13 02:24:02.827336 kernel: audit: type=1130 audit(1734056642.763:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.827344 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:24:02.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.706636 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:24:02.927106 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:24:02.927117 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:24:02.927150 kernel: audit: type=1130 audit(1734056642.883:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.706655 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:24:03.023597 kernel: audit: type=1130 audit(1734056642.934:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.708204 systemd-resolved[270]: Defaulting to hostname 'linux'. Dec 13 02:24:03.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.712594 systemd[1]: Started systemd-resolved.service. Dec 13 02:24:03.138649 kernel: audit: type=1130 audit(1734056643.031:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.138669 kernel: audit: type=1130 audit(1734056643.084:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:02.764545 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:24:02.884927 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:24:02.927692 systemd-modules-load[268]: Inserted module 'dm_multipath' Dec 13 02:24:02.935678 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:24:03.032740 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:24:03.085667 systemd[1]: Reached target nss-lookup.target. Dec 13 02:24:03.148042 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:24:03.155010 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:24:03.167981 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:24:03.168683 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:24:03.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.170698 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:24:03.287644 kernel: audit: type=1130 audit(1734056643.167:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.287662 kernel: audit: type=1130 audit(1734056643.229:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.230714 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:24:03.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.297144 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:24:03.319482 dracut-cmdline[293]: dracut-dracut-053 Dec 13 02:24:03.319482 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 02:24:03.319482 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:24:03.394407 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:24:03.394423 kernel: iscsi: registered transport (tcp) Dec 13 02:24:03.447958 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:24:03.447977 kernel: QLogic iSCSI HBA Driver Dec 13 02:24:03.464252 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:24:03.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:03.474139 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:24:03.532424 kernel: raid6: avx2x4 gen() 36004 MB/s Dec 13 02:24:03.567399 kernel: raid6: avx2x4 xor() 17488 MB/s Dec 13 02:24:03.602399 kernel: raid6: avx2x2 gen() 53600 MB/s Dec 13 02:24:03.637408 kernel: raid6: avx2x2 xor() 32063 MB/s Dec 13 02:24:03.672433 kernel: raid6: avx2x1 gen() 45087 MB/s Dec 13 02:24:03.705428 kernel: raid6: avx2x1 xor() 27574 MB/s Dec 13 02:24:03.739404 kernel: raid6: sse2x4 gen() 20881 MB/s Dec 13 02:24:03.773399 kernel: raid6: sse2x4 xor() 11506 MB/s Dec 13 02:24:03.807429 kernel: raid6: sse2x2 gen() 21174 MB/s Dec 13 02:24:03.841429 kernel: raid6: sse2x2 xor() 13123 MB/s Dec 13 02:24:03.875400 kernel: raid6: sse2x1 gen() 17928 MB/s Dec 13 02:24:03.927194 kernel: raid6: sse2x1 xor() 8740 MB/s Dec 13 02:24:03.927209 kernel: raid6: using algorithm avx2x2 gen() 53600 MB/s Dec 13 02:24:03.927217 kernel: raid6: .... xor() 32063 MB/s, rmw enabled Dec 13 02:24:03.945298 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:24:03.991409 kernel: xor: automatically using best checksumming function avx Dec 13 02:24:04.071374 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:24:04.076247 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:24:04.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:04.075000 audit: BPF prog-id=7 op=LOAD Dec 13 02:24:04.075000 audit: BPF prog-id=8 op=LOAD Dec 13 02:24:04.077250 systemd[1]: Starting systemd-udevd.service... Dec 13 02:24:04.085599 systemd-udevd[471]: Using default interface naming scheme 'v252'. Dec 13 02:24:04.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:04.097753 systemd[1]: Started systemd-udevd.service. Dec 13 02:24:04.139495 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Dec 13 02:24:04.115078 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:24:04.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:04.142740 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:24:04.158569 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:24:04.211715 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:24:04.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:04.237373 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:24:04.239406 kernel: libata version 3.00 loaded. Dec 13 02:24:04.275237 kernel: ACPI: bus type USB registered Dec 13 02:24:04.275284 kernel: usbcore: registered new interface driver usbfs Dec 13 02:24:04.275294 kernel: usbcore: registered new interface driver hub Dec 13 02:24:04.310267 kernel: usbcore: registered new device driver usb Dec 13 02:24:04.327372 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:24:04.327393 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 02:24:04.361429 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 02:24:04.362393 kernel: AES CTR mode by8 optimization enabled Dec 13 02:24:04.378369 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 02:24:04.819392 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 02:24:04.819498 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 02:24:04.819579 kernel: pps pps0: new PPS source ptp0 Dec 13 02:24:04.819692 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 02:24:04.819756 kernel: scsi host0: ahci Dec 13 02:24:04.819817 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 02:24:04.819874 kernel: scsi host1: ahci Dec 13 02:24:04.819929 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:ef:80 Dec 13 02:24:04.819981 kernel: scsi host2: ahci Dec 13 02:24:04.820036 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 02:24:04.820087 kernel: scsi host3: ahci Dec 13 02:24:04.820140 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 02:24:04.820191 kernel: scsi host4: ahci Dec 13 02:24:04.820245 kernel: scsi host5: ahci Dec 13 02:24:04.820301 kernel: scsi host6: ahci Dec 13 02:24:04.820353 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 02:24:05.168317 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Dec 13 02:24:05.168330 kernel: pps pps1: new PPS source ptp1 Dec 13 02:24:05.168427 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 02:24:05.168492 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 02:24:05.168546 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:ef:81 Dec 13 02:24:05.168597 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 02:24:05.168648 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 02:24:05.168699 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 02:24:05.168750 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Dec 13 02:24:05.168757 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Dec 13 02:24:05.168764 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Dec 13 02:24:05.168772 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Dec 13 02:24:05.168778 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Dec 13 02:24:05.168785 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Dec 13 02:24:05.168791 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 02:24:05.168842 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 02:24:05.168893 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 02:24:05.168900 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 02:24:05.168972 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 02:24:05.168981 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 02:24:05.939403 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 02:24:05.939420 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 02:24:05.939490 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 02:24:05.939499 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 02:24:05.939507 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 02:24:05.939517 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 02:24:05.939528 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 02:24:05.939535 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 02:24:05.939545 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 02:24:05.939551 kernel: ata1.00: Features: NCQ-prio Dec 13 02:24:05.939558 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 02:24:05.939564 kernel: ata2.00: Features: NCQ-prio Dec 13 02:24:05.939571 kernel: ata1.00: configured for UDMA/133 Dec 13 02:24:05.939577 kernel: ata2.00: configured for UDMA/133 Dec 13 02:24:05.939583 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 02:24:05.939656 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 02:24:06.050230 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 02:24:06.050294 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 02:24:06.050348 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 02:24:06.050402 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 02:24:06.050449 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 02:24:06.050498 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 02:24:06.050545 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 02:24:06.050593 kernel: port_module: 9 callbacks suppressed Dec 13 02:24:06.050601 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 02:24:06.050650 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 02:24:06.050697 kernel: hub 1-0:1.0: USB hub found Dec 13 02:24:06.050756 kernel: hub 1-0:1.0: 16 ports detected Dec 13 02:24:06.050808 kernel: hub 2-0:1.0: USB hub found Dec 13 02:24:06.050865 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 02:24:06.050914 kernel: hub 2-0:1.0: 10 ports detected Dec 13 02:24:06.050967 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.050975 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 02:24:06.050981 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 02:24:06.051035 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 02:24:06.051090 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 02:24:06.051142 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 02:24:06.051192 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 02:24:06.051246 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 02:24:06.051301 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 02:24:06.051353 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 02:24:06.051469 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 02:24:06.051521 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:24:06.051577 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:24:06.051631 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.051638 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 02:24:06.051644 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 02:24:06.051650 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 02:24:06.051703 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:24:06.051710 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 02:24:06.063916 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 02:24:06.064050 kernel: GPT:9289727 != 937703087 Dec 13 02:24:06.064063 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:24:06.064077 kernel: GPT:9289727 != 937703087 Dec 13 02:24:06.064089 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:24:06.064100 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 02:24:06.064111 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.064123 kernel: hub 1-14:1.0: USB hub found Dec 13 02:24:06.064200 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 02:24:06.064260 kernel: hub 1-14:1.0: 4 ports detected Dec 13 02:24:06.080407 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 02:24:06.098902 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:24:06.135656 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (659) Dec 13 02:24:06.135669 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 02:24:06.123486 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:24:06.148251 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:24:06.163492 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:24:06.195922 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:24:06.207630 systemd[1]: Starting disk-uuid.service... Dec 13 02:24:06.239490 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.239504 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 02:24:06.239563 disk-uuid[689]: Primary Header is updated. Dec 13 02:24:06.239563 disk-uuid[689]: Secondary Entries is updated. Dec 13 02:24:06.239563 disk-uuid[689]: Secondary Header is updated. Dec 13 02:24:06.288447 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.288457 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 02:24:06.288466 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:06.309406 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 02:24:06.364373 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 02:24:06.498382 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 02:24:06.529660 kernel: usbcore: registered new interface driver usbhid Dec 13 02:24:06.529677 kernel: usbhid: USB HID core driver Dec 13 02:24:06.561544 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 02:24:06.676038 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 02:24:06.676170 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 02:24:06.676179 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 02:24:07.294625 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 02:24:07.313337 disk-uuid[690]: The operation has completed successfully. Dec 13 02:24:07.322488 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 02:24:07.349134 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:24:07.447157 kernel: audit: type=1130 audit(1734056647.356:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.447175 kernel: audit: type=1131 audit(1734056647.356:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.349180 systemd[1]: Finished disk-uuid.service. Dec 13 02:24:07.477414 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:24:07.364070 systemd[1]: Starting verity-setup.service... Dec 13 02:24:07.508413 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:24:07.509271 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:24:07.533591 systemd[1]: Finished verity-setup.service. Dec 13 02:24:07.602261 kernel: audit: type=1130 audit(1734056647.540:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.602278 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:24:07.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.616007 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:24:07.623716 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:24:07.624110 systemd[1]: Starting ignition-setup.service... Dec 13 02:24:07.721493 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:24:07.721508 kernel: BTRFS info (device sdb6): using free space tree Dec 13 02:24:07.721519 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 02:24:07.721526 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 02:24:07.631913 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:24:07.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.714474 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:24:07.835925 kernel: audit: type=1130 audit(1734056647.729:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.835938 kernel: audit: type=1130 audit(1734056647.786:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.751465 systemd[1]: Finished ignition-setup.service. Dec 13 02:24:07.867129 kernel: audit: type=1334 audit(1734056647.843:24): prog-id=9 op=LOAD Dec 13 02:24:07.843000 audit: BPF prog-id=9 op=LOAD Dec 13 02:24:07.808001 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:24:07.845339 systemd[1]: Starting systemd-networkd.service... Dec 13 02:24:07.882414 systemd-networkd[873]: lo: Link UP Dec 13 02:24:07.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.929500 ignition[867]: Ignition 2.14.0 Dec 13 02:24:07.965613 kernel: audit: type=1130 audit(1734056647.898:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.882416 systemd-networkd[873]: lo: Gained carrier Dec 13 02:24:07.929505 ignition[867]: Stage: fetch-offline Dec 13 02:24:07.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.882702 systemd-networkd[873]: Enumeration completed Dec 13 02:24:08.115597 kernel: audit: type=1130 audit(1734056647.980:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:08.115610 kernel: audit: type=1130 audit(1734056648.040:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:08.115620 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 02:24:08.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.929532 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:08.141112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 02:24:07.882772 systemd[1]: Started systemd-networkd.service. Dec 13 02:24:07.929545 ignition[867]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:07.883342 systemd-networkd[873]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:24:08.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.938266 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:08.200424 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:24:08.200424 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:24:08.200424 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:24:08.200424 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:24:08.200424 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:24:08.200424 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:24:08.200424 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:24:08.347577 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 02:24:08.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.899520 systemd[1]: Reached target network.target. Dec 13 02:24:08.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:07.938338 ignition[867]: parsed url from cmdline: "" Dec 13 02:24:07.942482 unknown[867]: fetched base config from "system" Dec 13 02:24:07.938340 ignition[867]: no config URL provided Dec 13 02:24:07.942486 unknown[867]: fetched user config from "system" Dec 13 02:24:07.938343 ignition[867]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:24:07.959133 systemd[1]: Starting iscsiuio.service... Dec 13 02:24:07.938369 ignition[867]: parsing config with SHA512: 94cd2bd5c4f113de02820a79104e365e2b6e2245c0ab9303fb1dbf42b08123942e77b87dd7da0c562bb698cefbd1c97a2a2207402571352151e7d47becdcc5bf Dec 13 02:24:07.973619 systemd[1]: Started iscsiuio.service. Dec 13 02:24:07.942741 ignition[867]: fetch-offline: fetch-offline passed Dec 13 02:24:07.981791 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:24:07.942744 ignition[867]: POST message to Packet Timeline Dec 13 02:24:08.041626 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:24:07.942749 ignition[867]: POST Status error: resource requires networking Dec 13 02:24:08.042076 systemd[1]: Starting ignition-kargs.service... Dec 13 02:24:07.942784 ignition[867]: Ignition finished successfully Dec 13 02:24:08.116489 systemd-networkd[873]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:24:08.120257 ignition[889]: Ignition 2.14.0 Dec 13 02:24:08.129943 systemd[1]: Starting iscsid.service... Dec 13 02:24:08.120260 ignition[889]: Stage: kargs Dec 13 02:24:08.155515 systemd[1]: Started iscsid.service. Dec 13 02:24:08.120316 ignition[889]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:08.169880 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:24:08.120344 ignition[889]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:08.189575 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:24:08.121708 ignition[889]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:08.208562 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:24:08.123142 ignition[889]: kargs: kargs passed Dec 13 02:24:08.228549 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:24:08.123145 ignition[889]: POST message to Packet Timeline Dec 13 02:24:08.255661 systemd[1]: Reached target remote-fs.target. Dec 13 02:24:08.123156 ignition[889]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 02:24:08.295977 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:24:08.126945 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43920->[::1]:53: read: connection refused Dec 13 02:24:08.326589 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:24:08.327342 ignition[889]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 02:24:08.335751 systemd-networkd[873]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:24:08.327746 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:47008->[::1]:53: read: connection refused Dec 13 02:24:08.363623 systemd-networkd[873]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:24:08.391905 systemd-networkd[873]: enp1s0f1np1: Link UP Dec 13 02:24:08.392075 systemd-networkd[873]: enp1s0f1np1: Gained carrier Dec 13 02:24:08.403716 systemd-networkd[873]: enp1s0f0np0: Link UP Dec 13 02:24:08.403943 systemd-networkd[873]: eno2: Link UP Dec 13 02:24:08.404170 systemd-networkd[873]: eno1: Link UP Dec 13 02:24:08.727946 ignition[889]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 02:24:08.729064 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45954->[::1]:53: read: connection refused Dec 13 02:24:09.183952 systemd-networkd[873]: enp1s0f0np0: Gained carrier Dec 13 02:24:09.193609 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 02:24:09.215547 systemd-networkd[873]: enp1s0f0np0: DHCPv4 address 147.75.203.55/31, gateway 147.75.203.54 acquired from 145.40.83.140 Dec 13 02:24:09.529709 ignition[889]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 02:24:09.531175 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58305->[::1]:53: read: connection refused Dec 13 02:24:09.800959 systemd-networkd[873]: enp1s0f1np1: Gained IPv6LL Dec 13 02:24:11.016962 systemd-networkd[873]: enp1s0f0np0: Gained IPv6LL Dec 13 02:24:11.132699 ignition[889]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 02:24:11.134123 ignition[889]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33941->[::1]:53: read: connection refused Dec 13 02:24:14.337313 ignition[889]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 02:24:15.110785 ignition[889]: GET result: OK Dec 13 02:24:15.447351 ignition[889]: Ignition finished successfully Dec 13 02:24:15.451923 systemd[1]: Finished ignition-kargs.service. Dec 13 02:24:15.538758 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 02:24:15.538773 kernel: audit: type=1130 audit(1734056655.461:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:15.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:15.471436 ignition[918]: Ignition 2.14.0 Dec 13 02:24:15.464653 systemd[1]: Starting ignition-disks.service... Dec 13 02:24:15.471440 ignition[918]: Stage: disks Dec 13 02:24:15.471535 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:15.471545 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:15.474008 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:15.474598 ignition[918]: disks: disks passed Dec 13 02:24:15.474601 ignition[918]: POST message to Packet Timeline Dec 13 02:24:15.474613 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 02:24:16.129636 ignition[918]: GET result: OK Dec 13 02:24:16.465143 ignition[918]: Ignition finished successfully Dec 13 02:24:16.466897 systemd[1]: Finished ignition-disks.service. Dec 13 02:24:16.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:16.480940 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:24:16.559640 kernel: audit: type=1130 audit(1734056656.479:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:16.545609 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:24:16.545644 systemd[1]: Reached target local-fs.target. Dec 13 02:24:16.568610 systemd[1]: Reached target sysinit.target. Dec 13 02:24:16.582600 systemd[1]: Reached target basic.target. Dec 13 02:24:16.598348 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:24:16.620377 systemd-fsck[936]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:24:16.631837 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:24:16.724968 kernel: audit: type=1130 audit(1734056656.639:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:16.724984 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:24:16.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:16.646228 systemd[1]: Mounting sysroot.mount... Dec 13 02:24:16.733016 systemd[1]: Mounted sysroot.mount. Dec 13 02:24:16.747698 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:24:16.764392 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:24:16.779406 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 02:24:16.793981 systemd[1]: Starting flatcar-static-network.service... Dec 13 02:24:16.810548 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:24:16.810610 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:24:16.829613 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:24:16.852674 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:24:16.865289 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:24:17.002666 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (949) Dec 13 02:24:17.002684 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:24:17.002766 kernel: BTRFS info (device sdb6): using free space tree Dec 13 02:24:17.002773 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 02:24:17.002781 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 02:24:16.930542 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:24:17.066542 kernel: audit: type=1130 audit(1734056657.010:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.066581 coreos-metadata[944]: Dec 13 02:24:16.934 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 02:24:17.086576 coreos-metadata[943]: Dec 13 02:24:16.934 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 02:24:17.107414 initrd-setup-root[954]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:24:17.012687 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:24:17.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.157551 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:24:17.190572 kernel: audit: type=1130 audit(1734056657.123:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.074972 systemd[1]: Starting ignition-mount.service... Dec 13 02:24:17.197641 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:24:17.093963 systemd[1]: Starting sysroot-boot.service... Dec 13 02:24:17.215619 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:24:17.115340 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:24:17.235601 ignition[1019]: INFO : Ignition 2.14.0 Dec 13 02:24:17.235601 ignition[1019]: INFO : Stage: mount Dec 13 02:24:17.235601 ignition[1019]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:17.235601 ignition[1019]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:17.235601 ignition[1019]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:17.235601 ignition[1019]: INFO : mount: mount passed Dec 13 02:24:17.235601 ignition[1019]: INFO : POST message to Packet Timeline Dec 13 02:24:17.235601 ignition[1019]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 02:24:17.115385 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:24:17.116001 systemd[1]: Finished sysroot-boot.service. Dec 13 02:24:17.472607 coreos-metadata[943]: Dec 13 02:24:17.472 INFO Fetch successful Dec 13 02:24:17.547939 coreos-metadata[943]: Dec 13 02:24:17.547 INFO wrote hostname ci-3510.3.6-a-f1dd79c03e to /sysroot/etc/hostname Dec 13 02:24:17.548413 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 02:24:17.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.626416 kernel: audit: type=1130 audit(1734056657.568:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.704157 coreos-metadata[944]: Dec 13 02:24:17.704 INFO Fetch successful Dec 13 02:24:17.729661 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 02:24:17.729725 systemd[1]: Finished flatcar-static-network.service. Dec 13 02:24:17.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.777503 ignition[1019]: INFO : GET result: OK Dec 13 02:24:17.869599 kernel: audit: type=1130 audit(1734056657.746:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.869614 kernel: audit: type=1131 audit(1734056657.746:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:17.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:19.074126 ignition[1019]: INFO : Ignition finished successfully Dec 13 02:24:19.076868 systemd[1]: Finished ignition-mount.service. Dec 13 02:24:19.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:19.093742 systemd[1]: Starting ignition-files.service... Dec 13 02:24:19.166458 kernel: audit: type=1130 audit(1734056659.090:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:19.160177 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:24:19.211458 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1036) Dec 13 02:24:19.211468 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:24:19.245818 kernel: BTRFS info (device sdb6): using free space tree Dec 13 02:24:19.245833 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 02:24:19.294404 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 02:24:19.296350 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:24:19.312513 ignition[1055]: INFO : Ignition 2.14.0 Dec 13 02:24:19.312513 ignition[1055]: INFO : Stage: files Dec 13 02:24:19.312513 ignition[1055]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:19.312513 ignition[1055]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:19.312513 ignition[1055]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:19.316791 unknown[1055]: wrote ssh authorized keys file for user: core Dec 13 02:24:19.378541 ignition[1055]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:24:19.378541 ignition[1055]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:24:19.378541 ignition[1055]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:24:19.378541 ignition[1055]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:24:19.378541 ignition[1055]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:24:19.378541 ignition[1055]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:24:19.378541 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:24:19.378541 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:24:19.378541 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:24:19.517485 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1061) Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 02:24:19.517510 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3999158477" Dec 13 02:24:19.774708 ignition[1055]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3999158477": device or resource busy Dec 13 02:24:19.774708 ignition[1055]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3999158477", trying btrfs: device or resource busy Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3999158477" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3999158477" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3999158477" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3999158477" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:24:19.774708 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:24:19.975168 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 02:24:20.215403 ignition[1055]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:24:20.215403 ignition[1055]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:24:20.215403 ignition[1055]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:24:20.215403 ignition[1055]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Dec 13 02:24:20.215403 ignition[1055]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Dec 13 02:24:20.215403 ignition[1055]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(13): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(15): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:24:20.297683 ignition[1055]: INFO : files: files passed Dec 13 02:24:20.297683 ignition[1055]: INFO : POST message to Packet Timeline Dec 13 02:24:20.297683 ignition[1055]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 02:24:20.835279 ignition[1055]: INFO : GET result: OK Dec 13 02:24:21.202483 ignition[1055]: INFO : Ignition finished successfully Dec 13 02:24:21.205198 systemd[1]: Finished ignition-files.service. Dec 13 02:24:21.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.277391 kernel: audit: type=1130 audit(1734056661.217:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.224319 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:24:21.285622 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:24:21.319649 initrd-setup-root-after-ignition[1087]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:24:21.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.285948 systemd[1]: Starting ignition-quench.service... Dec 13 02:24:21.510870 kernel: audit: type=1130 audit(1734056661.328:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.510886 kernel: audit: type=1130 audit(1734056661.396:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.510894 kernel: audit: type=1131 audit(1734056661.396:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.302726 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:24:21.329794 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:24:21.329863 systemd[1]: Finished ignition-quench.service. Dec 13 02:24:21.668112 kernel: audit: type=1130 audit(1734056661.551:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.668128 kernel: audit: type=1131 audit(1734056661.551:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.397650 systemd[1]: Reached target ignition-complete.target. Dec 13 02:24:21.519973 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:24:21.541195 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:24:21.541241 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:24:21.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.552666 systemd[1]: Reached target initrd-fs.target. Dec 13 02:24:21.798611 kernel: audit: type=1130 audit(1734056661.725:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.676603 systemd[1]: Reached target initrd.target. Dec 13 02:24:21.692649 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:24:21.693124 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:24:21.708805 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:24:21.747238 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:24:21.929444 kernel: audit: type=1131 audit(1734056661.863:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:21.794575 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:24:21.807713 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:24:21.833753 systemd[1]: Stopped target timers.target. Dec 13 02:24:21.848743 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:24:21.848863 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:24:21.864950 systemd[1]: Stopped target initrd.target. Dec 13 02:24:21.936745 systemd[1]: Stopped target basic.target. Dec 13 02:24:21.950711 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:24:21.968719 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:24:21.984737 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:24:22.000771 systemd[1]: Stopped target remote-fs.target. Dec 13 02:24:22.016832 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:24:22.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.033082 systemd[1]: Stopped target sysinit.target. Dec 13 02:24:22.195585 kernel: audit: type=1131 audit(1734056662.111:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.049082 systemd[1]: Stopped target local-fs.target. Dec 13 02:24:22.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.065038 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:24:22.279605 kernel: audit: type=1131 audit(1734056662.202:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.082037 systemd[1]: Stopped target swap.target. Dec 13 02:24:22.097879 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:24:22.098243 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:24:22.113176 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:24:22.188697 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:24:22.188775 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:24:22.203785 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:24:22.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.203858 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:24:22.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.272812 systemd[1]: Stopped target paths.target. Dec 13 02:24:22.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.286607 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:24:22.434502 ignition[1103]: INFO : Ignition 2.14.0 Dec 13 02:24:22.434502 ignition[1103]: INFO : Stage: umount Dec 13 02:24:22.434502 ignition[1103]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:24:22.434502 ignition[1103]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 02:24:22.434502 ignition[1103]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 02:24:22.434502 ignition[1103]: INFO : umount: umount passed Dec 13 02:24:22.434502 ignition[1103]: INFO : POST message to Packet Timeline Dec 13 02:24:22.434502 ignition[1103]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 02:24:22.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:22.290611 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:24:22.293774 systemd[1]: Stopped target slices.target. Dec 13 02:24:22.316704 systemd[1]: Stopped target sockets.target. Dec 13 02:24:22.331755 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:24:22.331834 systemd[1]: Closed iscsid.socket. Dec 13 02:24:22.345837 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:24:22.345944 systemd[1]: Closed iscsiuio.socket. Dec 13 02:24:22.361036 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:24:22.361343 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:24:22.378156 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:24:22.378524 systemd[1]: Stopped ignition-files.service. Dec 13 02:24:22.396138 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 02:24:22.396512 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 02:24:22.414128 systemd[1]: Stopping ignition-mount.service... Dec 13 02:24:22.425911 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:24:22.441570 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:24:22.441749 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:24:22.448794 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:24:22.448883 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:24:22.474621 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:24:22.475637 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:24:22.475759 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:24:22.492475 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:24:22.492783 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:24:23.226280 ignition[1103]: INFO : GET result: OK Dec 13 02:24:23.612911 ignition[1103]: INFO : Ignition finished successfully Dec 13 02:24:23.615198 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:24:23.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.615459 systemd[1]: Stopped ignition-mount.service. Dec 13 02:24:23.630997 systemd[1]: Stopped target network.target. Dec 13 02:24:23.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.646593 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:24:23.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.646821 systemd[1]: Stopped ignition-disks.service. Dec 13 02:24:23.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.661790 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:24:23.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.661916 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:24:23.676822 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:24:23.676978 systemd[1]: Stopped ignition-setup.service. Dec 13 02:24:23.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.693819 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:24:23.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.771000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:24:23.693974 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:24:23.710102 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:24:23.715498 systemd-networkd[873]: enp1s0f0np0: DHCPv6 lease lost Dec 13 02:24:23.724555 systemd-networkd[873]: enp1s0f1np1: DHCPv6 lease lost Dec 13 02:24:23.816000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:24:23.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.725808 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:24:23.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.740308 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:24:23.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.740573 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:24:23.757098 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:24:23.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.757442 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:24:23.771685 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:24:23.771703 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:24:23.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.790012 systemd[1]: Stopping network-cleanup.service... Dec 13 02:24:23.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.809561 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:24:23.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.809713 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:24:23.825767 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:24:24.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.825845 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:24:24.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.842950 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:24:24.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.843083 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:24:24.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:24.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.859105 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:24:23.878755 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:24:23.880242 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:24:23.880582 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:24:23.891619 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:24:23.891753 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:24:23.905769 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:24:23.905890 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:24:23.921627 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:24:23.921760 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:24:23.938875 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:24:23.939023 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:24:23.954813 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:24:23.954960 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:24:24.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:23.972660 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:24:23.988560 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:24:23.988741 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:24:24.005003 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:24:24.005141 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:24:24.020697 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:24:24.020826 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:24:24.038262 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:24:24.288928 iscsid[900]: iscsid shutting down. Dec 13 02:24:24.039716 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:24:24.039936 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:24:24.168982 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:24:24.169218 systemd[1]: Stopped network-cleanup.service. Dec 13 02:24:24.177998 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:24:24.194339 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:24:24.232725 systemd[1]: Switching root. Dec 13 02:24:24.289235 systemd-journald[267]: Journal stopped Dec 13 02:24:28.121180 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Dec 13 02:24:28.121194 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:24:28.121203 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:24:28.121208 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:24:28.121213 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:24:28.121218 kernel: SELinux: policy capability open_perms=1 Dec 13 02:24:28.121224 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:24:28.121230 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:24:28.121236 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:24:28.121242 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:24:28.121247 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:24:28.121253 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:24:28.121258 systemd[1]: Successfully loaded SELinux policy in 303.191ms. Dec 13 02:24:28.121265 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.923ms. Dec 13 02:24:28.121273 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:24:28.121279 systemd[1]: Detected architecture x86-64. Dec 13 02:24:28.121285 systemd[1]: Detected first boot. Dec 13 02:24:28.121291 systemd[1]: Hostname set to . Dec 13 02:24:28.121297 systemd[1]: Initializing machine ID from random generator. Dec 13 02:24:28.121303 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:24:28.121309 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:24:28.121317 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:24:28.121326 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:24:28.121333 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:24:28.121339 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 02:24:28.121345 kernel: audit: type=1334 audit(1734056666.577:91): prog-id=12 op=LOAD Dec 13 02:24:28.121351 kernel: audit: type=1334 audit(1734056666.577:92): prog-id=3 op=UNLOAD Dec 13 02:24:28.121357 kernel: audit: type=1334 audit(1734056666.644:93): prog-id=13 op=LOAD Dec 13 02:24:28.121363 kernel: audit: type=1334 audit(1734056666.666:94): prog-id=14 op=LOAD Dec 13 02:24:28.121393 kernel: audit: type=1334 audit(1734056666.667:95): prog-id=4 op=UNLOAD Dec 13 02:24:28.121399 kernel: audit: type=1334 audit(1734056666.667:96): prog-id=5 op=UNLOAD Dec 13 02:24:28.121419 kernel: audit: type=1334 audit(1734056666.710:97): prog-id=15 op=LOAD Dec 13 02:24:28.121441 kernel: audit: type=1334 audit(1734056666.710:98): prog-id=12 op=UNLOAD Dec 13 02:24:28.121447 kernel: audit: type=1334 audit(1734056666.752:99): prog-id=16 op=LOAD Dec 13 02:24:28.121453 kernel: audit: type=1334 audit(1734056666.792:100): prog-id=17 op=LOAD Dec 13 02:24:28.121458 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:24:28.121465 systemd[1]: Stopped iscsiuio.service. Dec 13 02:24:28.121471 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:24:28.121478 systemd[1]: Stopped iscsid.service. Dec 13 02:24:28.121484 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:24:28.121492 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:24:28.121498 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:24:28.121504 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:24:28.121511 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:24:28.121518 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:24:28.121524 systemd[1]: Created slice system-getty.slice. Dec 13 02:24:28.121530 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:24:28.121537 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:24:28.121543 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:24:28.121550 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:24:28.121556 systemd[1]: Created slice user.slice. Dec 13 02:24:28.121563 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:24:28.121569 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:24:28.121576 systemd[1]: Set up automount boot.automount. Dec 13 02:24:28.121582 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:24:28.121589 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:24:28.121595 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:24:28.121601 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:24:28.121607 systemd[1]: Reached target integritysetup.target. Dec 13 02:24:28.121613 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:24:28.121621 systemd[1]: Reached target remote-fs.target. Dec 13 02:24:28.121627 systemd[1]: Reached target slices.target. Dec 13 02:24:28.121633 systemd[1]: Reached target swap.target. Dec 13 02:24:28.121639 systemd[1]: Reached target torcx.target. Dec 13 02:24:28.121646 systemd[1]: Reached target veritysetup.target. Dec 13 02:24:28.121653 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:24:28.121660 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:24:28.121666 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:24:28.121673 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:24:28.121679 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:24:28.121686 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:24:28.121692 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:24:28.121699 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:24:28.121705 systemd[1]: Mounting media.mount... Dec 13 02:24:28.121713 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:28.121719 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:24:28.121726 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:24:28.121732 systemd[1]: Mounting tmp.mount... Dec 13 02:24:28.121739 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:24:28.121745 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:24:28.121752 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:24:28.121758 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:24:28.121764 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:24:28.121771 systemd[1]: Starting modprobe@drm.service... Dec 13 02:24:28.121778 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:24:28.121784 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:24:28.121791 kernel: fuse: init (API version 7.34) Dec 13 02:24:28.121797 systemd[1]: Starting modprobe@loop.service... Dec 13 02:24:28.121803 kernel: loop: module loaded Dec 13 02:24:28.121809 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:24:28.121816 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:24:28.121822 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:24:28.121832 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:24:28.121839 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:24:28.121845 systemd[1]: Stopped systemd-journald.service. Dec 13 02:24:28.121851 systemd[1]: Starting systemd-journald.service... Dec 13 02:24:28.121858 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:24:28.121866 systemd-journald[1255]: Journal started Dec 13 02:24:28.121891 systemd-journald[1255]: Runtime Journal (/run/log/journal/8ea75a9556854b5a8c2bbc942dbb7a05) is 8.0M, max 640.1M, 632.1M free. Dec 13 02:24:24.672000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:24:24.943000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:24:24.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:24:24.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:24:24.945000 audit: BPF prog-id=10 op=LOAD Dec 13 02:24:24.945000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:24:24.945000 audit: BPF prog-id=11 op=LOAD Dec 13 02:24:24.945000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:24:25.015000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:24:25.015000 audit[1145]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001278e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:25.015000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:24:25.041000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:24:25.041000 audit[1145]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001279b9 a2=1ed a3=0 items=2 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:25.041000 audit: CWD cwd="/" Dec 13 02:24:25.041000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:25.041000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:25.041000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:24:26.577000 audit: BPF prog-id=12 op=LOAD Dec 13 02:24:26.577000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:24:26.644000 audit: BPF prog-id=13 op=LOAD Dec 13 02:24:26.666000 audit: BPF prog-id=14 op=LOAD Dec 13 02:24:26.667000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:24:26.667000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:24:26.710000 audit: BPF prog-id=15 op=LOAD Dec 13 02:24:26.710000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:24:26.752000 audit: BPF prog-id=16 op=LOAD Dec 13 02:24:26.792000 audit: BPF prog-id=17 op=LOAD Dec 13 02:24:26.792000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:24:26.792000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:24:26.812000 audit: BPF prog-id=18 op=LOAD Dec 13 02:24:26.812000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:24:26.812000 audit: BPF prog-id=19 op=LOAD Dec 13 02:24:26.812000 audit: BPF prog-id=20 op=LOAD Dec 13 02:24:26.812000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:24:26.812000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:24:26.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:26.850000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:24:26.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:26.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:26.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:26.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.093000 audit: BPF prog-id=21 op=LOAD Dec 13 02:24:28.094000 audit: BPF prog-id=22 op=LOAD Dec 13 02:24:28.094000 audit: BPF prog-id=23 op=LOAD Dec 13 02:24:28.094000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:24:28.094000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:24:28.117000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:24:28.117000 audit[1255]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff43c10e30 a2=4000 a3=7fff43c10ecc items=0 ppid=1 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:28.117000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:24:26.576727 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:24:25.014267 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:24:26.814262 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:24:25.014721 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:24:25.014737 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:24:25.014761 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:24:25.014770 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:24:25.014794 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:24:25.014804 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:24:25.014955 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:24:25.014988 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:24:25.015000 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:24:25.015779 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:24:25.015808 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:24:25.015824 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:24:25.015835 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:24:25.015849 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:24:25.015860 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:24:26.213453 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:24:26.213596 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:24:26.213650 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:24:26.213745 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:24:26.213776 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:24:26.213810 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-12-13T02:24:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:24:28.153574 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:24:28.175406 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:24:28.196415 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:24:28.229872 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:24:28.229896 systemd[1]: Stopped verity-setup.service. Dec 13 02:24:28.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.264412 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:28.278406 systemd[1]: Started systemd-journald.service. Dec 13 02:24:28.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.286905 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:24:28.294631 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:24:28.301638 systemd[1]: Mounted media.mount. Dec 13 02:24:28.308619 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:24:28.317613 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:24:28.326607 systemd[1]: Mounted tmp.mount. Dec 13 02:24:28.333689 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:24:28.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.342713 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:24:28.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.351740 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:24:28.351861 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:24:28.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.360923 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:24:28.361080 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:24:28.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.369929 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:24:28.370119 systemd[1]: Finished modprobe@drm.service. Dec 13 02:24:28.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.379207 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:24:28.379534 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:24:28.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.388206 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:24:28.388534 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:24:28.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.397185 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:24:28.397508 systemd[1]: Finished modprobe@loop.service. Dec 13 02:24:28.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.406212 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:24:28.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.415190 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:24:28.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.424239 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:24:28.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.433169 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:24:28.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.442769 systemd[1]: Reached target network-pre.target. Dec 13 02:24:28.454180 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:24:28.465111 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:24:28.472623 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:24:28.475801 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:24:28.483140 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:24:28.486424 systemd-journald[1255]: Time spent on flushing to /var/log/journal/8ea75a9556854b5a8c2bbc942dbb7a05 is 14.781ms for 1595 entries. Dec 13 02:24:28.486424 systemd-journald[1255]: System Journal (/var/log/journal/8ea75a9556854b5a8c2bbc942dbb7a05) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:24:28.529422 systemd-journald[1255]: Received client request to flush runtime journal. Dec 13 02:24:28.499467 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:24:28.499975 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:24:28.510482 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:24:28.511022 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:24:28.517977 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:24:28.524980 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:24:28.532662 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:24:28.540534 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:24:28.548630 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:24:28.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.556636 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:24:28.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.564607 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:24:28.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.572581 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:24:28.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.581624 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:24:28.590119 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:24:28.599397 udevadm[1272]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:24:28.608047 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:24:28.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.790153 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:24:28.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.797000 audit: BPF prog-id=24 op=LOAD Dec 13 02:24:28.798000 audit: BPF prog-id=25 op=LOAD Dec 13 02:24:28.798000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:24:28.798000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:24:28.799737 systemd[1]: Starting systemd-udevd.service... Dec 13 02:24:28.811490 systemd-udevd[1275]: Using default interface naming scheme 'v252'. Dec 13 02:24:28.830774 systemd[1]: Started systemd-udevd.service. Dec 13 02:24:28.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.840647 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 02:24:28.840000 audit: BPF prog-id=26 op=LOAD Dec 13 02:24:28.841881 systemd[1]: Starting systemd-networkd.service... Dec 13 02:24:28.861000 audit: BPF prog-id=27 op=LOAD Dec 13 02:24:28.861000 audit: BPF prog-id=28 op=LOAD Dec 13 02:24:28.861000 audit: BPF prog-id=29 op=LOAD Dec 13 02:24:28.863376 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 02:24:28.865760 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:24:28.877405 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 02:24:28.877445 kernel: IPMI message handler: version 39.2 Dec 13 02:24:28.881374 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 02:24:28.881403 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:24:28.885375 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1276) Dec 13 02:24:28.942526 kernel: ipmi device interface Dec 13 02:24:28.961415 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:24:28.976991 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:24:28.880000 audit[1332]: AVC avc: denied { confidentiality } for pid=1332 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:24:28.995324 systemd[1]: Started systemd-userdbd.service. Dec 13 02:24:29.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:28.880000 audit[1332]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563cee1a6e20 a1=4d98c a2=7fc5f6b34bc5 a3=5 items=42 ppid=1275 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:28.880000 audit: CWD cwd="/" Dec 13 02:24:28.880000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=1 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=2 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=3 name=(null) inode=21803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=4 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=5 name=(null) inode=21804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=6 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=7 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=8 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=9 name=(null) inode=21806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=10 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=11 name=(null) inode=21807 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=12 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=13 name=(null) inode=21808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=14 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=15 name=(null) inode=21809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=16 name=(null) inode=21805 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=17 name=(null) inode=21810 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=18 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=19 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=20 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=21 name=(null) inode=21812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=22 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=23 name=(null) inode=21813 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=24 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=25 name=(null) inode=21814 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=26 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=27 name=(null) inode=21815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=28 name=(null) inode=21811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=29 name=(null) inode=21816 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=30 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=31 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=32 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=33 name=(null) inode=21818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=34 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=35 name=(null) inode=21819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=36 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=37 name=(null) inode=21820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=38 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=39 name=(null) inode=21821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=40 name=(null) inode=21817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PATH item=41 name=(null) inode=21822 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:24:28.880000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:24:29.050213 kernel: ipmi_si: IPMI System Interface driver Dec 13 02:24:29.050341 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 02:24:29.118246 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 02:24:29.118324 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 02:24:29.118404 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 02:24:29.118416 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 02:24:29.118430 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 02:24:29.118496 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 02:24:29.259925 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 02:24:29.260004 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 02:24:29.260016 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 02:24:29.260092 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 02:24:29.260169 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 02:24:29.260233 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 02:24:29.260245 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 02:24:29.260902 systemd-networkd[1303]: bond0: netdev ready Dec 13 02:24:29.262931 systemd-networkd[1303]: lo: Link UP Dec 13 02:24:29.262934 systemd-networkd[1303]: lo: Gained carrier Dec 13 02:24:29.263414 systemd-networkd[1303]: Enumeration completed Dec 13 02:24:29.263499 systemd[1]: Started systemd-networkd.service. Dec 13 02:24:29.263698 systemd-networkd[1303]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 02:24:29.264290 systemd-networkd[1303]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:69.network. Dec 13 02:24:29.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:29.319601 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 02:24:29.319837 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 02:24:29.320016 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 02:24:29.398787 kernel: intel_rapl_common: Found RAPL domain package Dec 13 02:24:29.398843 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 02:24:29.398936 kernel: intel_rapl_common: Found RAPL domain core Dec 13 02:24:29.431794 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 02:24:29.431897 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 02:24:29.448372 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 02:24:29.467371 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 02:24:29.468646 systemd-networkd[1303]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:68.network. Dec 13 02:24:29.484372 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 02:24:29.525372 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 02:24:29.648452 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 02:24:29.648573 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 02:24:29.688414 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 02:24:29.709371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 02:24:29.721166 systemd-networkd[1303]: bond0: Link UP Dec 13 02:24:29.765581 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 02:24:29.765605 kernel: bond0: active interface up! Dec 13 02:24:29.790133 systemd-networkd[1303]: enp1s0f1np1: Link UP Dec 13 02:24:29.790371 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 02:24:29.790585 systemd-networkd[1303]: enp1s0f1np1: Gained carrier Dec 13 02:24:29.791584 systemd-networkd[1303]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:68.network. Dec 13 02:24:29.802621 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:24:29.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:29.811125 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:24:29.826288 lvm[1380]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:24:29.862757 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:24:29.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:29.870519 systemd[1]: Reached target cryptsetup.target. Dec 13 02:24:29.879047 systemd[1]: Starting lvm2-activation.service... Dec 13 02:24:29.881193 lvm[1381]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:24:29.919427 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:29.943399 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:29.947809 systemd[1]: Finished lvm2-activation.service. Dec 13 02:24:29.966418 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:29.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:29.983543 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:24:29.990427 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.006476 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:24:30.006490 systemd[1]: Reached target local-fs.target. Dec 13 02:24:30.014437 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.030501 systemd[1]: Reached target machines.target. Dec 13 02:24:30.037426 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.054031 systemd[1]: Starting ldconfig.service... Dec 13 02:24:30.060443 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.076064 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.076085 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:30.076639 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:24:30.083434 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.098932 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:24:30.106478 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.125058 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:24:30.128373 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.128827 systemd[1]: Starting systemd-sysext.service... Dec 13 02:24:30.129072 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1383 (bootctl) Dec 13 02:24:30.129707 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:24:30.148370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.149795 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:24:30.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.168489 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:24:30.169372 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.190251 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:24:30.190334 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:24:30.190373 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.210418 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.210451 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:24:30.225391 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.262405 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.281372 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.300357 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:24:30.300655 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.300691 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:24:30.300697 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:24:30.315371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.326352 systemd-fsck[1392]: fsck.fat 4.2 (2021-01-31) Dec 13 02:24:30.326352 systemd-fsck[1392]: /dev/sdb1: 789 files, 119291/258078 clusters Dec 13 02:24:30.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.349587 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:24:30.353371 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.373283 systemd[1]: Mounting boot.mount... Dec 13 02:24:30.373370 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.375054 systemd-networkd[1303]: enp1s0f0np0: Link UP Dec 13 02:24:30.375237 systemd-networkd[1303]: bond0: Gained carrier Dec 13 02:24:30.375329 systemd-networkd[1303]: enp1s0f0np0: Gained carrier Dec 13 02:24:30.394848 systemd[1]: Mounted boot.mount. Dec 13 02:24:30.408130 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 02:24:30.408161 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 02:24:30.418742 systemd-networkd[1303]: enp1s0f1np1: Link DOWN Dec 13 02:24:30.418744 systemd-networkd[1303]: enp1s0f1np1: Lost carrier Dec 13 02:24:30.425157 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:24:30.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.445372 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:24:30.458965 (sd-sysext)[1397]: Using extensions 'kubernetes'. Dec 13 02:24:30.459142 (sd-sysext)[1397]: Merged extensions into '/usr'. Dec 13 02:24:30.468010 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:30.468724 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:24:30.475514 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.476142 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:24:30.483022 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:24:30.489957 systemd[1]: Starting modprobe@loop.service... Dec 13 02:24:30.492039 ldconfig[1382]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:24:30.496495 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.496563 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:30.496628 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:30.498278 systemd[1]: Finished ldconfig.service. Dec 13 02:24:30.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.506595 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:24:30.514603 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:24:30.514666 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:24:30.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.522634 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:24:30.522697 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:24:30.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.531641 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:24:30.531702 systemd[1]: Finished modprobe@loop.service. Dec 13 02:24:30.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.539689 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:24:30.539747 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.540243 systemd[1]: Finished systemd-sysext.service. Dec 13 02:24:30.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.549017 systemd[1]: Starting ensure-sysext.service... Dec 13 02:24:30.555967 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:24:30.561761 systemd-tmpfiles[1404]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:24:30.563083 systemd-tmpfiles[1404]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:24:30.564074 systemd-tmpfiles[1404]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:24:30.565553 systemd[1]: Reloading. Dec 13 02:24:30.586510 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-12-13T02:24:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:24:30.586533 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-12-13T02:24:30Z" level=info msg="torcx already run" Dec 13 02:24:30.605433 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 02:24:30.623376 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Dec 13 02:24:30.623415 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 02:24:30.623874 systemd-networkd[1303]: enp1s0f1np1: Link UP Dec 13 02:24:30.624028 systemd-networkd[1303]: enp1s0f1np1: Gained carrier Dec 13 02:24:30.655433 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 02:24:30.658285 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:24:30.658292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:24:30.669449 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:24:30.709000 audit: BPF prog-id=30 op=LOAD Dec 13 02:24:30.709000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:24:30.709000 audit: BPF prog-id=31 op=LOAD Dec 13 02:24:30.709000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:24:30.709000 audit: BPF prog-id=32 op=LOAD Dec 13 02:24:30.710000 audit: BPF prog-id=33 op=LOAD Dec 13 02:24:30.710000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:24:30.710000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:24:30.711000 audit: BPF prog-id=34 op=LOAD Dec 13 02:24:30.711000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:24:30.711000 audit: BPF prog-id=35 op=LOAD Dec 13 02:24:30.711000 audit: BPF prog-id=36 op=LOAD Dec 13 02:24:30.711000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:24:30.711000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:24:30.712000 audit: BPF prog-id=37 op=LOAD Dec 13 02:24:30.712000 audit: BPF prog-id=38 op=LOAD Dec 13 02:24:30.712000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:24:30.712000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:24:30.714380 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:24:30.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:30.724256 systemd[1]: Starting audit-rules.service... Dec 13 02:24:30.731982 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:24:30.739000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:24:30.739000 audit[1500]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe514ab620 a2=420 a3=0 items=0 ppid=1484 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:30.739000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:24:30.741459 augenrules[1500]: No rules Dec 13 02:24:30.742053 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:24:30.752353 systemd[1]: Starting systemd-resolved.service... Dec 13 02:24:30.761277 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:24:30.768954 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:24:30.775774 systemd[1]: Finished audit-rules.service. Dec 13 02:24:30.782591 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:24:30.790582 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:24:30.804327 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:24:30.813018 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.813660 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:24:30.821001 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:24:30.828953 systemd[1]: Starting modprobe@loop.service... Dec 13 02:24:30.831856 systemd-resolved[1506]: Positive Trust Anchors: Dec 13 02:24:30.831863 systemd-resolved[1506]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:24:30.831881 systemd-resolved[1506]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:24:30.835474 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.835563 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:30.835602 systemd-resolved[1506]: Using system hostname 'ci-3510.3.6-a-f1dd79c03e'. Dec 13 02:24:30.836294 systemd[1]: Starting systemd-update-done.service... Dec 13 02:24:30.843471 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:24:30.844099 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:24:30.852897 systemd[1]: Started systemd-resolved.service. Dec 13 02:24:30.861684 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:24:30.861752 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:24:30.869677 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:24:30.869741 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:24:30.877674 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:24:30.877736 systemd[1]: Finished modprobe@loop.service. Dec 13 02:24:30.885670 systemd[1]: Finished systemd-update-done.service. Dec 13 02:24:30.895088 systemd[1]: Reached target network.target. Dec 13 02:24:30.903519 systemd[1]: Reached target nss-lookup.target. Dec 13 02:24:30.911529 systemd[1]: Reached target time-set.target. Dec 13 02:24:30.919622 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.920261 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:24:30.927998 systemd[1]: Starting modprobe@drm.service... Dec 13 02:24:30.934991 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:24:30.941983 systemd[1]: Starting modprobe@loop.service... Dec 13 02:24:30.948496 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:24:30.948563 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:30.949144 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:24:30.957473 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:24:30.958107 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:24:30.958168 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:24:30.966663 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:24:30.966723 systemd[1]: Finished modprobe@drm.service. Dec 13 02:24:30.974629 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:24:30.974687 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:24:30.982632 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:24:30.982690 systemd[1]: Finished modprobe@loop.service. Dec 13 02:24:30.990702 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:24:30.990771 systemd[1]: Reached target sysinit.target. Dec 13 02:24:30.998499 systemd[1]: Started motdgen.path. Dec 13 02:24:31.005478 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:24:31.015528 systemd[1]: Started logrotate.timer. Dec 13 02:24:31.022504 systemd[1]: Started mdadm.timer. Dec 13 02:24:31.029469 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:24:31.037451 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:24:31.037465 systemd[1]: Reached target paths.target. Dec 13 02:24:31.044451 systemd[1]: Reached target timers.target. Dec 13 02:24:31.051559 systemd[1]: Listening on dbus.socket. Dec 13 02:24:31.058883 systemd[1]: Starting docker.socket... Dec 13 02:24:31.066847 systemd[1]: Listening on sshd.socket. Dec 13 02:24:31.073521 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:31.073544 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:24:31.073845 systemd[1]: Finished ensure-sysext.service. Dec 13 02:24:31.082517 systemd[1]: Listening on docker.socket. Dec 13 02:24:31.089873 systemd[1]: Reached target sockets.target. Dec 13 02:24:31.098441 systemd[1]: Reached target basic.target. Dec 13 02:24:31.105611 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:24:31.105625 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:24:31.106071 systemd[1]: Starting containerd.service... Dec 13 02:24:31.112902 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:24:31.122923 systemd[1]: Starting coreos-metadata.service... Dec 13 02:24:31.130039 systemd[1]: Starting dbus.service... Dec 13 02:24:31.136020 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:24:31.140865 jq[1531]: false Dec 13 02:24:31.142949 systemd[1]: Starting extend-filesystems.service... Dec 13 02:24:31.144158 coreos-metadata[1524]: Dec 13 02:24:31.144 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 02:24:31.149466 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:24:31.149709 dbus-daemon[1530]: [system] SELinux support is enabled Dec 13 02:24:31.150141 systemd[1]: Starting motdgen.service... Dec 13 02:24:31.151152 extend-filesystems[1532]: Found loop1 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sda Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb1 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb2 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb3 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found usr Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb4 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb6 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb7 Dec 13 02:24:31.171518 extend-filesystems[1532]: Found sdb9 Dec 13 02:24:31.171518 extend-filesystems[1532]: Checking size of /dev/sdb9 Dec 13 02:24:31.171518 extend-filesystems[1532]: Resized partition /dev/sdb9 Dec 13 02:24:31.319414 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Dec 13 02:24:31.319549 coreos-metadata[1527]: Dec 13 02:24:31.154 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 02:24:31.157477 systemd[1]: Starting prepare-helm.service... Dec 13 02:24:31.319820 extend-filesystems[1548]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:24:31.187197 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:24:31.330499 dbus-daemon[1530]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:24:31.201068 systemd[1]: Starting sshd-keygen.service... Dec 13 02:24:31.217440 systemd[1]: Starting systemd-logind.service... Dec 13 02:24:31.229415 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:24:31.230098 systemd[1]: Starting tcsd.service... Dec 13 02:24:31.335999 update_engine[1561]: I1213 02:24:31.284170 1561 main.cc:92] Flatcar Update Engine starting Dec 13 02:24:31.335999 update_engine[1561]: I1213 02:24:31.290000 1561 update_check_scheduler.cc:74] Next update check in 4m13s Dec 13 02:24:31.241213 systemd-logind[1559]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 02:24:31.336316 jq[1562]: true Dec 13 02:24:31.241223 systemd-logind[1559]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 02:24:31.241236 systemd-logind[1559]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 02:24:31.336562 tar[1564]: linux-amd64/helm Dec 13 02:24:31.241361 systemd-logind[1559]: New seat seat0. Dec 13 02:24:31.336764 jq[1566]: true Dec 13 02:24:31.241905 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:24:31.242280 systemd[1]: Starting update-engine.service... Dec 13 02:24:31.256984 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:24:31.265720 systemd[1]: Started dbus.service. Dec 13 02:24:31.290011 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:24:31.290101 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:24:31.290247 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:24:31.290326 systemd[1]: Finished motdgen.service. Dec 13 02:24:31.310873 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:24:31.310959 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:24:31.335797 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 02:24:31.335893 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 02:24:31.337832 systemd[1]: Started update-engine.service. Dec 13 02:24:31.339444 env[1567]: time="2024-12-13T02:24:31.339421591Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:24:31.347866 env[1567]: time="2024-12-13T02:24:31.347821944Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:24:31.348613 env[1567]: time="2024-12-13T02:24:31.348577527Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349209 env[1567]: time="2024-12-13T02:24:31.349195303Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349234 env[1567]: time="2024-12-13T02:24:31.349209490Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349324 env[1567]: time="2024-12-13T02:24:31.349314076Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349347 env[1567]: time="2024-12-13T02:24:31.349324196Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349347 env[1567]: time="2024-12-13T02:24:31.349331225Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:24:31.349347 env[1567]: time="2024-12-13T02:24:31.349336438Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.349480 systemd[1]: Started systemd-logind.service. Dec 13 02:24:31.351269 env[1567]: time="2024-12-13T02:24:31.351258902Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.351429 env[1567]: time="2024-12-13T02:24:31.351395397Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:24:31.351515 env[1567]: time="2024-12-13T02:24:31.351476108Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:24:31.351515 env[1567]: time="2024-12-13T02:24:31.351486739Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:24:31.351561 env[1567]: time="2024-12-13T02:24:31.351512937Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:24:31.351561 env[1567]: time="2024-12-13T02:24:31.351520450Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:24:31.358050 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:31.359133 systemd[1]: Started locksmithd.service. Dec 13 02:24:31.362537 bash[1594]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:24:31.365483 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:24:31.365579 systemd[1]: Reached target system-config.target. Dec 13 02:24:31.366628 env[1567]: time="2024-12-13T02:24:31.366607016Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:24:31.366663 env[1567]: time="2024-12-13T02:24:31.366634776Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:24:31.366663 env[1567]: time="2024-12-13T02:24:31.366646766Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:24:31.366718 env[1567]: time="2024-12-13T02:24:31.366670044Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366718 env[1567]: time="2024-12-13T02:24:31.366682727Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366718 env[1567]: time="2024-12-13T02:24:31.366695067Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366718 env[1567]: time="2024-12-13T02:24:31.366706942Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366809 env[1567]: time="2024-12-13T02:24:31.366718901Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366809 env[1567]: time="2024-12-13T02:24:31.366730266Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366809 env[1567]: time="2024-12-13T02:24:31.366741777Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366809 env[1567]: time="2024-12-13T02:24:31.366752577Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.366809 env[1567]: time="2024-12-13T02:24:31.366763398Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:24:31.366989 env[1567]: time="2024-12-13T02:24:31.366835057Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:24:31.366989 env[1567]: time="2024-12-13T02:24:31.366894530Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:24:31.367061 env[1567]: time="2024-12-13T02:24:31.367051839Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:24:31.367092 env[1567]: time="2024-12-13T02:24:31.367067496Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367092 env[1567]: time="2024-12-13T02:24:31.367075395Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367104354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367111786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367118353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367125707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367132250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367141 env[1567]: time="2024-12-13T02:24:31.367139049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367150992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367157649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367166328Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367228797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367237901Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367244606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367251097Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367258570Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367265384Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:24:31.367275 env[1567]: time="2024-12-13T02:24:31.367275297Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:24:31.367523 env[1567]: time="2024-12-13T02:24:31.367300047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:24:31.367549 env[1567]: time="2024-12-13T02:24:31.367416551Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:24:31.367549 env[1567]: time="2024-12-13T02:24:31.367448862Z" level=info msg="Connect containerd service" Dec 13 02:24:31.367549 env[1567]: time="2024-12-13T02:24:31.367466550Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.367843676Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.367963234Z" level=info msg="Start subscribing containerd event" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.367977981Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.367995430Z" level=info msg="Start recovering state" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368003438Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368025763Z" level=info msg="containerd successfully booted in 0.028949s" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368025901Z" level=info msg="Start event monitor" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368038325Z" level=info msg="Start snapshots syncer" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368043609Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:24:31.369384 env[1567]: time="2024-12-13T02:24:31.368047520Z" level=info msg="Start streaming server" Dec 13 02:24:31.373526 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:24:31.373618 systemd[1]: Reached target user-config.target. Dec 13 02:24:31.381475 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:24:31.383529 systemd[1]: Started containerd.service. Dec 13 02:24:31.391728 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:24:31.415671 locksmithd[1602]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:24:31.592556 tar[1564]: linux-amd64/LICENSE Dec 13 02:24:31.592634 tar[1564]: linux-amd64/README.md Dec 13 02:24:31.595503 systemd[1]: Finished prepare-helm.service. Dec 13 02:24:31.624696 systemd-timesyncd[1507]: Network configuration changed, trying to establish connection. Dec 13 02:24:31.666402 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Dec 13 02:24:31.688440 systemd-networkd[1303]: bond0: Gained IPv6LL Dec 13 02:24:31.688623 systemd-timesyncd[1507]: Network configuration changed, trying to establish connection. Dec 13 02:24:31.689390 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:24:31.695264 extend-filesystems[1548]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Dec 13 02:24:31.695264 extend-filesystems[1548]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 02:24:31.695264 extend-filesystems[1548]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Dec 13 02:24:31.753505 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 02:24:31.753683 sshd_keygen[1558]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:24:31.753738 extend-filesystems[1532]: Resized filesystem in /dev/sdb9 Dec 13 02:24:31.698791 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:24:31.698896 systemd[1]: Finished extend-filesystems.service. Dec 13 02:24:31.717738 systemd[1]: Reached target network-online.target. Dec 13 02:24:31.743608 systemd[1]: Starting kubelet.service... Dec 13 02:24:31.760913 systemd[1]: Finished sshd-keygen.service. Dec 13 02:24:31.776961 systemd[1]: Starting issuegen.service... Dec 13 02:24:31.783635 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:24:31.783718 systemd[1]: Finished issuegen.service. Dec 13 02:24:31.791171 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:24:31.799680 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:24:31.808217 systemd[1]: Started getty@tty1.service. Dec 13 02:24:31.816269 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 02:24:31.824547 systemd[1]: Reached target getty.target. Dec 13 02:24:32.537286 systemd[1]: Started kubelet.service. Dec 13 02:24:33.169832 kubelet[1636]: E1213 02:24:33.169780 1636 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:24:33.170903 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:24:33.170975 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:24:36.832795 login[1633]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:24:36.840575 systemd[1]: Created slice user-500.slice. Dec 13 02:24:36.841150 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:24:36.842170 systemd-logind[1559]: New session 1 of user core. Dec 13 02:24:36.842795 login[1632]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:24:36.844999 systemd-logind[1559]: New session 2 of user core. Dec 13 02:24:36.847028 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:24:36.847775 systemd[1]: Starting user@500.service... Dec 13 02:24:36.849758 (systemd)[1655]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:36.922287 systemd[1655]: Queued start job for default target default.target. Dec 13 02:24:36.922521 systemd[1655]: Reached target paths.target. Dec 13 02:24:36.922533 systemd[1655]: Reached target sockets.target. Dec 13 02:24:36.922540 systemd[1655]: Reached target timers.target. Dec 13 02:24:36.922547 systemd[1655]: Reached target basic.target. Dec 13 02:24:36.922567 systemd[1655]: Reached target default.target. Dec 13 02:24:36.922581 systemd[1655]: Startup finished in 69ms. Dec 13 02:24:36.922629 systemd[1]: Started user@500.service. Dec 13 02:24:36.923142 systemd[1]: Started session-1.scope. Dec 13 02:24:36.923533 systemd[1]: Started session-2.scope. Dec 13 02:24:37.321562 coreos-metadata[1524]: Dec 13 02:24:37.321 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 02:24:37.322302 coreos-metadata[1527]: Dec 13 02:24:37.321 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 02:24:37.854770 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 02:24:37.854944 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 02:24:38.321948 coreos-metadata[1527]: Dec 13 02:24:38.321 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 02:24:38.322171 coreos-metadata[1524]: Dec 13 02:24:38.321 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 02:24:38.828282 systemd[1]: Created slice system-sshd.slice. Dec 13 02:24:38.828940 systemd[1]: Started sshd@0-147.75.203.55:22-139.178.68.195:43404.service. Dec 13 02:24:38.901801 sshd[1676]: Accepted publickey for core from 139.178.68.195 port 43404 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:38.902551 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:38.905077 systemd-logind[1559]: New session 3 of user core. Dec 13 02:24:38.905505 systemd[1]: Started session-3.scope. Dec 13 02:24:38.939553 coreos-metadata[1524]: Dec 13 02:24:38.939 INFO Fetch successful Dec 13 02:24:38.956345 systemd[1]: Started sshd@1-147.75.203.55:22-139.178.68.195:43742.service. Dec 13 02:24:38.983104 unknown[1524]: wrote ssh authorized keys file for user: core Dec 13 02:24:38.990722 sshd[1681]: Accepted publickey for core from 139.178.68.195 port 43742 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:38.991508 sshd[1681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:38.993706 systemd-logind[1559]: New session 4 of user core. Dec 13 02:24:38.994272 systemd[1]: Started session-4.scope. Dec 13 02:24:38.994861 update-ssh-keys[1683]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:24:38.995182 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:24:39.045362 sshd[1681]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:39.047680 systemd[1]: sshd@1-147.75.203.55:22-139.178.68.195:43742.service: Deactivated successfully. Dec 13 02:24:39.048192 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:24:39.048827 systemd-logind[1559]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:24:39.049671 systemd[1]: Started sshd@2-147.75.203.55:22-139.178.68.195:43746.service. Dec 13 02:24:39.050382 systemd-logind[1559]: Removed session 4. Dec 13 02:24:39.085785 sshd[1688]: Accepted publickey for core from 139.178.68.195 port 43746 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:39.086560 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:39.089083 systemd-logind[1559]: New session 5 of user core. Dec 13 02:24:39.089604 systemd[1]: Started session-5.scope. Dec 13 02:24:39.135713 coreos-metadata[1527]: Dec 13 02:24:39.135 INFO Fetch successful Dec 13 02:24:39.144198 sshd[1688]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:39.145520 systemd[1]: sshd@2-147.75.203.55:22-139.178.68.195:43746.service: Deactivated successfully. Dec 13 02:24:39.145887 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:24:39.146231 systemd-logind[1559]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:24:39.146910 systemd-logind[1559]: Removed session 5. Dec 13 02:24:39.168385 systemd[1]: Finished coreos-metadata.service. Dec 13 02:24:39.169140 systemd[1]: Started packet-phone-home.service. Dec 13 02:24:39.169255 systemd[1]: Reached target multi-user.target. Dec 13 02:24:39.169883 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:24:39.173752 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:24:39.173825 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:24:39.173964 systemd[1]: Startup finished in 1.859s (kernel) + 22.512s (initrd) + 14.820s (userspace) = 39.193s. Dec 13 02:24:39.174136 curl[1695]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 02:24:39.174231 curl[1695]: Dload Upload Total Spent Left Speed Dec 13 02:24:39.531983 curl[1695]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 02:24:39.534515 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 02:24:43.422832 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:24:43.423385 systemd[1]: Stopped kubelet.service. Dec 13 02:24:43.424668 systemd[1]: Starting kubelet.service... Dec 13 02:24:43.609079 systemd[1]: Started kubelet.service. Dec 13 02:24:43.660597 kubelet[1702]: E1213 02:24:43.660541 1702 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:24:43.662632 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:24:43.662704 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:24:49.153298 systemd[1]: Started sshd@3-147.75.203.55:22-139.178.68.195:53840.service. Dec 13 02:24:49.187766 sshd[1722]: Accepted publickey for core from 139.178.68.195 port 53840 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.188439 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.190921 systemd-logind[1559]: New session 6 of user core. Dec 13 02:24:49.191319 systemd[1]: Started session-6.scope. Dec 13 02:24:49.247132 sshd[1722]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:49.252301 systemd[1]: sshd@3-147.75.203.55:22-139.178.68.195:53840.service: Deactivated successfully. Dec 13 02:24:49.253823 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:24:49.254274 systemd-logind[1559]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:24:49.254891 systemd[1]: Started sshd@4-147.75.203.55:22-139.178.68.195:53856.service. Dec 13 02:24:49.255360 systemd-logind[1559]: Removed session 6. Dec 13 02:24:49.289179 sshd[1728]: Accepted publickey for core from 139.178.68.195 port 53856 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.289860 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.292307 systemd-logind[1559]: New session 7 of user core. Dec 13 02:24:49.292772 systemd[1]: Started session-7.scope. Dec 13 02:24:49.340996 sshd[1728]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:49.344382 systemd[1]: sshd@4-147.75.203.55:22-139.178.68.195:53856.service: Deactivated successfully. Dec 13 02:24:49.345190 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:24:49.346076 systemd-logind[1559]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:24:49.347439 systemd[1]: Started sshd@5-147.75.203.55:22-139.178.68.195:53866.service. Dec 13 02:24:49.348774 systemd-logind[1559]: Removed session 7. Dec 13 02:24:49.384907 sshd[1735]: Accepted publickey for core from 139.178.68.195 port 53866 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.385652 sshd[1735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.388056 systemd-logind[1559]: New session 8 of user core. Dec 13 02:24:49.388614 systemd[1]: Started session-8.scope. Dec 13 02:24:49.443430 sshd[1735]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:49.448387 systemd[1]: sshd@5-147.75.203.55:22-139.178.68.195:53866.service: Deactivated successfully. Dec 13 02:24:49.449856 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:24:49.451280 systemd-logind[1559]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:24:49.454224 systemd[1]: Started sshd@6-147.75.203.55:22-139.178.68.195:53880.service. Dec 13 02:24:49.456915 systemd-logind[1559]: Removed session 8. Dec 13 02:24:49.552463 sshd[1741]: Accepted publickey for core from 139.178.68.195 port 53880 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.554008 sshd[1741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.558700 systemd-logind[1559]: New session 9 of user core. Dec 13 02:24:49.559996 systemd[1]: Started session-9.scope. Dec 13 02:24:49.626443 sudo[1744]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:24:49.626582 sudo[1744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:24:49.642640 dbus-daemon[1530]: \xd0\u001d,\u007f7V: received setenforce notice (enforcing=-2095596992) Dec 13 02:24:49.644091 sudo[1744]: pam_unix(sudo:session): session closed for user root Dec 13 02:24:49.646278 sshd[1741]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:49.648658 systemd[1]: sshd@6-147.75.203.55:22-139.178.68.195:53880.service: Deactivated successfully. Dec 13 02:24:49.649187 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:24:49.649834 systemd-logind[1559]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:24:49.650906 systemd[1]: Started sshd@7-147.75.203.55:22-139.178.68.195:53890.service. Dec 13 02:24:49.651716 systemd-logind[1559]: Removed session 9. Dec 13 02:24:49.709402 sshd[1748]: Accepted publickey for core from 139.178.68.195 port 53890 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.710892 sshd[1748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.715871 systemd-logind[1559]: New session 10 of user core. Dec 13 02:24:49.717229 systemd[1]: Started session-10.scope. Dec 13 02:24:49.784300 sudo[1752]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:24:49.784992 sudo[1752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:24:49.792237 sudo[1752]: pam_unix(sudo:session): session closed for user root Dec 13 02:24:49.805268 sudo[1751]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:24:49.805940 sudo[1751]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:24:49.828009 systemd[1]: Stopping audit-rules.service... Dec 13 02:24:49.827000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:24:49.828947 auditctl[1755]: No rules Dec 13 02:24:49.829117 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:24:49.829192 systemd[1]: Stopped audit-rules.service. Dec 13 02:24:49.829955 systemd[1]: Starting audit-rules.service... Dec 13 02:24:49.834332 kernel: kauditd_printk_skb: 146 callbacks suppressed Dec 13 02:24:49.834452 kernel: audit: type=1305 audit(1734056689.827:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:24:49.839314 augenrules[1772]: No rules Dec 13 02:24:49.839646 systemd[1]: Finished audit-rules.service. Dec 13 02:24:49.840030 sudo[1751]: pam_unix(sudo:session): session closed for user root Dec 13 02:24:49.840809 sshd[1748]: pam_unix(sshd:session): session closed for user core Dec 13 02:24:49.842145 systemd[1]: sshd@7-147.75.203.55:22-139.178.68.195:53890.service: Deactivated successfully. Dec 13 02:24:49.842466 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:24:49.842838 systemd-logind[1559]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:24:49.843316 systemd[1]: Started sshd@8-147.75.203.55:22-139.178.68.195:53892.service. Dec 13 02:24:49.843783 systemd-logind[1559]: Removed session 10. Dec 13 02:24:49.827000 audit[1755]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea8c893e0 a2=420 a3=0 items=0 ppid=1 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:49.880852 kernel: audit: type=1300 audit(1734056689.827:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea8c893e0 a2=420 a3=0 items=0 ppid=1 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:49.880899 kernel: audit: type=1327 audit(1734056689.827:198): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:24:49.827000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:24:49.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.919636 sshd[1778]: Accepted publickey for core from 139.178.68.195 port 53892 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:24:49.921186 sshd[1778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:24:49.923659 systemd-logind[1559]: New session 11 of user core. Dec 13 02:24:49.924082 systemd[1]: Started session-11.scope. Dec 13 02:24:49.935308 kernel: audit: type=1131 audit(1734056689.827:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.935332 kernel: audit: type=1130 audit(1734056689.838:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.935350 kernel: audit: type=1106 audit(1734056689.838:201): pid=1751 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.838000 audit[1751]: USER_END pid=1751 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.961369 kernel: audit: type=1104 audit(1734056689.838:202): pid=1751 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.838000 audit[1751]: CRED_DISP pid=1751 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.971062 sudo[1781]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:24:49.971185 sudo[1781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:24:49.983296 systemd[1]: Starting docker.service... Dec 13 02:24:49.984990 kernel: audit: type=1106 audit(1734056689.839:203): pid=1748 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.839000 audit[1748]: USER_END pid=1748 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:50.000099 env[1797]: time="2024-12-13T02:24:50.000046664Z" level=info msg="Starting up" Dec 13 02:24:50.000670 env[1797]: time="2024-12-13T02:24:50.000659964Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:24:50.000670 env[1797]: time="2024-12-13T02:24:50.000668793Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:24:50.000728 env[1797]: time="2024-12-13T02:24:50.000681006Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:24:50.000728 env[1797]: time="2024-12-13T02:24:50.000687385Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:24:50.001481 env[1797]: time="2024-12-13T02:24:50.001469682Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:24:50.001481 env[1797]: time="2024-12-13T02:24:50.001477975Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:24:50.001534 env[1797]: time="2024-12-13T02:24:50.001485090Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:24:50.001534 env[1797]: time="2024-12-13T02:24:50.001490414Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:24:50.017312 kernel: audit: type=1104 audit(1734056689.840:204): pid=1748 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.840000 audit[1748]: CRED_DISP pid=1748 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:50.043393 kernel: audit: type=1131 audit(1734056689.840:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.55:22-139.178.68.195:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.55:22-139.178.68.195:53890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:50.050575 env[1797]: time="2024-12-13T02:24:50.050547448Z" level=info msg="Loading containers: start." Dec 13 02:24:49.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.55:22-139.178.68.195:53892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.918000 audit[1778]: USER_ACCT pid=1778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.919000 audit[1778]: CRED_ACQ pid=1778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.919000 audit[1778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9bff3d20 a2=3 a3=0 items=0 ppid=1 pid=1778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:49.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:24:49.925000 audit[1778]: USER_START pid=1778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.925000 audit[1780]: CRED_ACQ pid=1780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:49.969000 audit[1781]: USER_ACCT pid=1781 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.969000 audit[1781]: CRED_REFR pid=1781 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:49.970000 audit[1781]: USER_START pid=1781 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:24:50.098000 audit[1841]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.098000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe4a845620 a2=0 a3=7ffe4a84560c items=0 ppid=1797 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:24:50.099000 audit[1843]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.099000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe8c4da440 a2=0 a3=7ffe8c4da42c items=0 ppid=1797 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:24:50.099000 audit[1845]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.099000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdbdc593c0 a2=0 a3=7ffdbdc593ac items=0 ppid=1797 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:24:50.100000 audit[1847]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.100000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd9b23d1f0 a2=0 a3=7ffd9b23d1dc items=0 ppid=1797 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:24:50.102000 audit[1849]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.102000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe68314720 a2=0 a3=7ffe6831470c items=0 ppid=1797 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:24:50.147000 audit[1854]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.147000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4f487e40 a2=0 a3=7ffc4f487e2c items=0 ppid=1797 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.147000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:24:50.151000 audit[1856]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.151000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe06564c50 a2=0 a3=7ffe06564c3c items=0 ppid=1797 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:24:50.152000 audit[1858]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.152000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc226fde50 a2=0 a3=7ffc226fde3c items=0 ppid=1797 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:24:50.153000 audit[1860]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.153000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe7dbe3080 a2=0 a3=7ffe7dbe306c items=0 ppid=1797 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:24:50.156000 audit[1864]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.156000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe628d8570 a2=0 a3=7ffe628d855c items=0 ppid=1797 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:24:50.172000 audit[1865]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.172000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffda29eb3d0 a2=0 a3=7ffda29eb3bc items=0 ppid=1797 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:24:50.187425 kernel: Initializing XFRM netlink socket Dec 13 02:24:50.227865 env[1797]: time="2024-12-13T02:24:50.227795159Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:24:50.228938 systemd-timesyncd[1507]: Network configuration changed, trying to establish connection. Dec 13 02:24:50.248000 audit[1873]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.248000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff4085d550 a2=0 a3=7fff4085d53c items=0 ppid=1797 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:24:50.271000 audit[1876]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.271000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffe889dd60 a2=0 a3=7fffe889dd4c items=0 ppid=1797 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.271000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:24:50.274000 audit[1879]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.274000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd58665b90 a2=0 a3=7ffd58665b7c items=0 ppid=1797 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.274000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:24:50.277000 audit[1881]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.277000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff190004b0 a2=0 a3=7fff1900049c items=0 ppid=1797 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.277000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:24:50.279000 audit[1883]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.279000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc62437f30 a2=0 a3=7ffc62437f1c items=0 ppid=1797 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.279000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:24:50.282000 audit[1885]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.282000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe22597440 a2=0 a3=7ffe2259742c items=0 ppid=1797 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:24:50.284000 audit[1887]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.284000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc121d01c0 a2=0 a3=7ffc121d01ac items=0 ppid=1797 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:24:50.300000 audit[1890]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.300000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff9ccf6700 a2=0 a3=7fff9ccf66ec items=0 ppid=1797 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:24:50.305000 audit[1892]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.305000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffefddaee00 a2=0 a3=7ffefddaedec items=0 ppid=1797 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:24:50.310000 audit[1894]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.310000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffda0905170 a2=0 a3=7ffda090515c items=0 ppid=1797 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:24:50.314000 audit[1896]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.314000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc42571cb0 a2=0 a3=7ffc42571c9c items=0 ppid=1797 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:24:50.317055 systemd-networkd[1303]: docker0: Link UP Dec 13 02:24:50.345000 audit[1900]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.345000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8a1288e0 a2=0 a3=7ffe8a1288cc items=0 ppid=1797 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.345000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:24:50.357000 audit[1901]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:24:50.357000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffff1107010 a2=0 a3=7ffff1106ffc items=0 ppid=1797 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:50.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:24:50.359423 env[1797]: time="2024-12-13T02:24:50.359334481Z" level=info msg="Loading containers: done." Dec 13 02:24:50.384843 env[1797]: time="2024-12-13T02:24:50.384716778Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:24:50.385316 env[1797]: time="2024-12-13T02:24:50.385250158Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:24:50.385747 env[1797]: time="2024-12-13T02:24:50.385656737Z" level=info msg="Daemon has completed initialization" Dec 13 02:24:50.389351 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4016880350-merged.mount: Deactivated successfully. Dec 13 02:24:50.410875 systemd[1]: Started docker.service. Dec 13 02:24:50.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:50.427434 env[1797]: time="2024-12-13T02:24:50.427279970Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:24:50.505819 systemd-timesyncd[1507]: Contacted time server [2600:3c05::f03c:94ff:fe24:f6eb]:123 (2.flatcar.pool.ntp.org). Dec 13 02:24:50.505888 systemd-timesyncd[1507]: Initial clock synchronization to Fri 2024-12-13 02:24:50.510043 UTC. Dec 13 02:24:51.609150 env[1567]: time="2024-12-13T02:24:51.609024212Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 02:24:52.264263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3883000894.mount: Deactivated successfully. Dec 13 02:24:53.454922 env[1567]: time="2024-12-13T02:24:53.454892375Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:53.455579 env[1567]: time="2024-12-13T02:24:53.455566188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:53.456567 env[1567]: time="2024-12-13T02:24:53.456544917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:53.457939 env[1567]: time="2024-12-13T02:24:53.457927317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:53.458288 env[1567]: time="2024-12-13T02:24:53.458246644Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 02:24:53.466923 env[1567]: time="2024-12-13T02:24:53.466903696Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 02:24:53.733472 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:24:53.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:53.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:53.734139 systemd[1]: Stopped kubelet.service. Dec 13 02:24:53.737579 systemd[1]: Starting kubelet.service... Dec 13 02:24:53.955896 systemd[1]: Started kubelet.service. Dec 13 02:24:53.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:24:54.006918 kubelet[1974]: E1213 02:24:54.006805 1974 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:24:54.008173 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:24:54.008260 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:24:54.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:24:55.034718 env[1567]: time="2024-12-13T02:24:55.034674474Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:55.035328 env[1567]: time="2024-12-13T02:24:55.035314284Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:55.036470 env[1567]: time="2024-12-13T02:24:55.036442470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:55.037550 env[1567]: time="2024-12-13T02:24:55.037537719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:55.038003 env[1567]: time="2024-12-13T02:24:55.037988756Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 02:24:55.044618 env[1567]: time="2024-12-13T02:24:55.044558143Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 02:24:56.119868 env[1567]: time="2024-12-13T02:24:56.119820131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:56.120493 env[1567]: time="2024-12-13T02:24:56.120435986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:56.121521 env[1567]: time="2024-12-13T02:24:56.121487572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:56.122570 env[1567]: time="2024-12-13T02:24:56.122530875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:56.123051 env[1567]: time="2024-12-13T02:24:56.123008388Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 02:24:56.129142 env[1567]: time="2024-12-13T02:24:56.129092286Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:24:57.062675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3118138936.mount: Deactivated successfully. Dec 13 02:24:57.418741 env[1567]: time="2024-12-13T02:24:57.418651334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:57.419318 env[1567]: time="2024-12-13T02:24:57.419283490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:57.420503 env[1567]: time="2024-12-13T02:24:57.420453471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:57.421031 env[1567]: time="2024-12-13T02:24:57.420998018Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:57.421338 env[1567]: time="2024-12-13T02:24:57.421308287Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:24:57.428304 env[1567]: time="2024-12-13T02:24:57.428285146Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:24:58.001604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount714697043.mount: Deactivated successfully. Dec 13 02:24:58.683772 env[1567]: time="2024-12-13T02:24:58.683717623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:58.684470 env[1567]: time="2024-12-13T02:24:58.684394134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:58.685356 env[1567]: time="2024-12-13T02:24:58.685342540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:58.686750 env[1567]: time="2024-12-13T02:24:58.686722074Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:58.687089 env[1567]: time="2024-12-13T02:24:58.687075396Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:24:58.693061 env[1567]: time="2024-12-13T02:24:58.693045881Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:24:59.176497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2508655109.mount: Deactivated successfully. Dec 13 02:24:59.178004 env[1567]: time="2024-12-13T02:24:59.177950907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:59.178671 env[1567]: time="2024-12-13T02:24:59.178636179Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:59.179344 env[1567]: time="2024-12-13T02:24:59.179303950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:59.180195 env[1567]: time="2024-12-13T02:24:59.180151920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:24:59.180569 env[1567]: time="2024-12-13T02:24:59.180534464Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:24:59.185717 env[1567]: time="2024-12-13T02:24:59.185697070Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 02:24:59.731486 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1800434265.mount: Deactivated successfully. Dec 13 02:25:01.386492 env[1567]: time="2024-12-13T02:25:01.386415588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:01.387189 env[1567]: time="2024-12-13T02:25:01.387157242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:01.388267 env[1567]: time="2024-12-13T02:25:01.388257294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:01.389621 env[1567]: time="2024-12-13T02:25:01.389567358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:01.390120 env[1567]: time="2024-12-13T02:25:01.390059393Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 02:25:03.312094 systemd[1]: Stopped kubelet.service. Dec 13 02:25:03.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.313377 systemd[1]: Starting kubelet.service... Dec 13 02:25:03.317713 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:25:03.317758 kernel: audit: type=1130 audit(1734056703.311:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.322727 systemd[1]: Reloading. Dec 13 02:25:03.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.356719 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2024-12-13T02:25:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:25:03.356734 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2024-12-13T02:25:03Z" level=info msg="torcx already run" Dec 13 02:25:03.394811 kernel: audit: type=1131 audit(1734056703.311:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.416056 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:25:03.416063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:25:03.427464 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.583252 kernel: audit: type=1400 audit(1734056703.473:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.583301 kernel: audit: type=1400 audit(1734056703.473:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.583316 kernel: audit: type=1400 audit(1734056703.473:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.640582 kernel: audit: type=1400 audit(1734056703.473:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.700035 kernel: audit: type=1400 audit(1734056703.473:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761360 kernel: audit: type=1400 audit(1734056703.473:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.823806 kernel: audit: type=1400 audit(1734056703.473:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886606 kernel: audit: type=1400 audit(1734056703.473:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.640000 audit: BPF prog-id=46 op=LOAD Dec 13 02:25:03.640000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit: BPF prog-id=47 op=LOAD Dec 13 02:25:03.761000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit: BPF prog-id=48 op=LOAD Dec 13 02:25:03.886000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit: BPF prog-id=49 op=LOAD Dec 13 02:25:03.949000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit: BPF prog-id=50 op=LOAD Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit: BPF prog-id=51 op=LOAD Dec 13 02:25:03.949000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:25:03.949000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.950000 audit: BPF prog-id=52 op=LOAD Dec 13 02:25:03.950000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit: BPF prog-id=53 op=LOAD Dec 13 02:25:03.951000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit: BPF prog-id=54 op=LOAD Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit: BPF prog-id=55 op=LOAD Dec 13 02:25:03.952000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:25:03.952000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit: BPF prog-id=56 op=LOAD Dec 13 02:25:03.953000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit: BPF prog-id=57 op=LOAD Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit: BPF prog-id=58 op=LOAD Dec 13 02:25:03.953000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:25:03.953000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit: BPF prog-id=59 op=LOAD Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:03.953000 audit: BPF prog-id=60 op=LOAD Dec 13 02:25:03.953000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:25:03.953000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:25:03.958286 systemd[1]: Started kubelet.service. Dec 13 02:25:03.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.960186 systemd[1]: Stopping kubelet.service... Dec 13 02:25:03.960441 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:25:03.960532 systemd[1]: Stopped kubelet.service. Dec 13 02:25:03.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:03.961309 systemd[1]: Starting kubelet.service... Dec 13 02:25:04.130129 systemd[1]: Started kubelet.service. Dec 13 02:25:04.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:04.162894 kubelet[2243]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:25:04.162894 kubelet[2243]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:25:04.162894 kubelet[2243]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:25:04.162894 kubelet[2243]: I1213 02:25:04.162857 2243 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:25:04.495278 kubelet[2243]: I1213 02:25:04.495241 2243 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:25:04.495278 kubelet[2243]: I1213 02:25:04.495253 2243 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:25:04.495446 kubelet[2243]: I1213 02:25:04.495389 2243 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:25:04.506109 kubelet[2243]: I1213 02:25:04.506040 2243 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:25:04.508064 kubelet[2243]: E1213 02:25:04.508028 2243 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.203.55:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.532561 kubelet[2243]: I1213 02:25:04.532505 2243 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:25:04.533630 kubelet[2243]: I1213 02:25:04.533580 2243 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:25:04.533735 kubelet[2243]: I1213 02:25:04.533601 2243 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-f1dd79c03e","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:25:04.534156 kubelet[2243]: I1213 02:25:04.534119 2243 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:25:04.534156 kubelet[2243]: I1213 02:25:04.534129 2243 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:25:04.534210 kubelet[2243]: I1213 02:25:04.534192 2243 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:25:04.534964 kubelet[2243]: I1213 02:25:04.534918 2243 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:25:04.534964 kubelet[2243]: I1213 02:25:04.534927 2243 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:25:04.534964 kubelet[2243]: I1213 02:25:04.534940 2243 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:25:04.534964 kubelet[2243]: I1213 02:25:04.534948 2243 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:25:04.546244 kubelet[2243]: W1213 02:25:04.546168 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.55:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.546244 kubelet[2243]: E1213 02:25:04.546228 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.55:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.548081 kubelet[2243]: W1213 02:25:04.548023 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.75.203.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-f1dd79c03e&limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.548081 kubelet[2243]: E1213 02:25:04.548058 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-f1dd79c03e&limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.552417 kubelet[2243]: I1213 02:25:04.552393 2243 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:25:04.555094 kubelet[2243]: I1213 02:25:04.555050 2243 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:25:04.555094 kubelet[2243]: W1213 02:25:04.555090 2243 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:25:04.555529 kubelet[2243]: I1213 02:25:04.555492 2243 server.go:1264] "Started kubelet" Dec 13 02:25:04.555596 kubelet[2243]: I1213 02:25:04.555532 2243 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:25:04.555652 kubelet[2243]: I1213 02:25:04.555597 2243 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:25:04.555898 kubelet[2243]: I1213 02:25:04.555860 2243 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:25:04.561585 kubelet[2243]: E1213 02:25:04.561519 2243 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:25:04.562363 kubelet[2243]: I1213 02:25:04.562315 2243 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:25:04.562000 audit[2243]: AVC avc: denied { mac_admin } for pid=2243 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:04.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:04.562000 audit[2243]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b1ccc0 a1=c000aa31e8 a2=c000b1cc90 a3=25 items=0 ppid=1 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:04.562000 audit[2243]: AVC avc: denied { mac_admin } for pid=2243 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:04.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:04.562000 audit[2243]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeaac0 a1=c000aa3200 a2=c000b1cd50 a3=25 items=0 ppid=1 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562461 2243 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562509 2243 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562565 2243 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562639 2243 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:25:04.563080 kubelet[2243]: E1213 02:25:04.562653 2243 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-f1dd79c03e\" not found" Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562684 2243 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:25:04.563080 kubelet[2243]: I1213 02:25:04.562756 2243 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:25:04.563080 kubelet[2243]: E1213 02:25:04.562896 2243 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-f1dd79c03e?timeout=10s\": dial tcp 147.75.203.55:6443: connect: connection refused" interval="200ms" Dec 13 02:25:04.563399 kubelet[2243]: W1213 02:25:04.563071 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.75.203.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.563399 kubelet[2243]: E1213 02:25:04.563124 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.563399 kubelet[2243]: I1213 02:25:04.563226 2243 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:25:04.563399 kubelet[2243]: I1213 02:25:04.563320 2243 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:25:04.563719 kubelet[2243]: E1213 02:25:04.563386 2243 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.203.55:6443/api/v1/namespaces/default/events\": dial tcp 147.75.203.55:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-f1dd79c03e.18109b62a769e587 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-f1dd79c03e,UID:ci-3510.3.6-a-f1dd79c03e,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-f1dd79c03e,},FirstTimestamp:2024-12-13 02:25:04.555476359 +0000 UTC m=+0.421440274,LastTimestamp:2024-12-13 02:25:04.555476359 +0000 UTC m=+0.421440274,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-f1dd79c03e,}" Dec 13 02:25:04.567724 kubelet[2243]: I1213 02:25:04.567672 2243 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:25:04.568000 audit[2266]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.568000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf4b58200 a2=0 a3=7ffcf4b581ec items=0 ppid=2243 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:25:04.569000 audit[2267]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.569000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeec386860 a2=0 a3=7ffeec38684c items=0 ppid=2243 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:25:04.572000 audit[2269]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.572000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd02665f80 a2=0 a3=7ffd02665f6c items=0 ppid=2243 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:25:04.574000 audit[2271]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.574000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe876857b0 a2=0 a3=7ffe8768579c items=0 ppid=2243 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:25:04.582000 audit[2274]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.582000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff6df6cae0 a2=0 a3=7fff6df6cacc items=0 ppid=2243 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:25:04.583567 kubelet[2243]: I1213 02:25:04.583530 2243 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:25:04.584000 audit[2275]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:04.584000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0f250fb0 a2=0 a3=7ffe0f250f9c items=0 ppid=2243 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:25:04.584785 kubelet[2243]: I1213 02:25:04.584669 2243 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:25:04.584785 kubelet[2243]: I1213 02:25:04.584704 2243 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:25:04.584785 kubelet[2243]: I1213 02:25:04.584722 2243 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:25:04.584785 kubelet[2243]: E1213 02:25:04.584767 2243 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:25:04.585307 kubelet[2243]: W1213 02:25:04.585260 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.75.203.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.585397 kubelet[2243]: E1213 02:25:04.585320 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:04.585000 audit[2277]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:04.585000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebe82d940 a2=0 a3=7ffebe82d92c items=0 ppid=2243 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:25:04.585000 audit[2278]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.585000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91e1ae50 a2=0 a3=7ffc91e1ae3c items=0 ppid=2243 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:25:04.586000 audit[2279]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:04.586000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff8c321f30 a2=0 a3=7fff8c321f1c items=0 ppid=2243 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:25:04.586000 audit[2280]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.586000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebd250820 a2=0 a3=7ffebd25080c items=0 ppid=2243 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:25:04.587000 audit[2281]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:04.587000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdaea6c300 a2=0 a3=7ffdaea6c2ec items=0 ppid=2243 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:25:04.587000 audit[2282]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:04.587000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff89870690 a2=0 a3=7fff8987067c items=0 ppid=2243 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:25:04.646847 kubelet[2243]: I1213 02:25:04.646750 2243 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:25:04.646847 kubelet[2243]: I1213 02:25:04.646796 2243 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:25:04.646847 kubelet[2243]: I1213 02:25:04.646851 2243 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:25:04.648723 kubelet[2243]: I1213 02:25:04.648649 2243 policy_none.go:49] "None policy: Start" Dec 13 02:25:04.649851 kubelet[2243]: I1213 02:25:04.649763 2243 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:25:04.650018 kubelet[2243]: I1213 02:25:04.649867 2243 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:25:04.666578 kubelet[2243]: I1213 02:25:04.666495 2243 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.667451 kubelet[2243]: E1213 02:25:04.667236 2243 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.55:6443/api/v1/nodes\": dial tcp 147.75.203.55:6443: connect: connection refused" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.676878 systemd[1]: Created slice kubepods.slice. Dec 13 02:25:04.685597 kubelet[2243]: E1213 02:25:04.685504 2243 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:25:04.687538 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:25:04.694925 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:25:04.712141 kubelet[2243]: I1213 02:25:04.712066 2243 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:25:04.711000 audit[2243]: AVC avc: denied { mac_admin } for pid=2243 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:04.711000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:04.711000 audit[2243]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001125710 a1=c00104c7f8 a2=c0011256e0 a3=25 items=0 ppid=1 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:04.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:04.713035 kubelet[2243]: I1213 02:25:04.712202 2243 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:25:04.713035 kubelet[2243]: I1213 02:25:04.712449 2243 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:25:04.713035 kubelet[2243]: I1213 02:25:04.712712 2243 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:25:04.714757 kubelet[2243]: E1213 02:25:04.714680 2243 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-f1dd79c03e\" not found" Dec 13 02:25:04.765065 kubelet[2243]: E1213 02:25:04.764822 2243 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-f1dd79c03e?timeout=10s\": dial tcp 147.75.203.55:6443: connect: connection refused" interval="400ms" Dec 13 02:25:04.872020 kubelet[2243]: I1213 02:25:04.871929 2243 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.872729 kubelet[2243]: E1213 02:25:04.872633 2243 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.55:6443/api/v1/nodes\": dial tcp 147.75.203.55:6443: connect: connection refused" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.885804 kubelet[2243]: I1213 02:25:04.885684 2243 topology_manager.go:215] "Topology Admit Handler" podUID="6a39b0caf3332c199b9e7216139d44cf" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.888945 kubelet[2243]: I1213 02:25:04.888889 2243 topology_manager.go:215] "Topology Admit Handler" podUID="04455561513fe15cc427eb00be8a31af" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.892359 kubelet[2243]: I1213 02:25:04.892305 2243 topology_manager.go:215] "Topology Admit Handler" podUID="978699fcad8303ca2d1d9b4850cfa0bc" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.906343 systemd[1]: Created slice kubepods-burstable-pod6a39b0caf3332c199b9e7216139d44cf.slice. Dec 13 02:25:04.927416 systemd[1]: Created slice kubepods-burstable-pod04455561513fe15cc427eb00be8a31af.slice. Dec 13 02:25:04.935175 systemd[1]: Created slice kubepods-burstable-pod978699fcad8303ca2d1d9b4850cfa0bc.slice. Dec 13 02:25:04.965868 kubelet[2243]: I1213 02:25:04.965795 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966174 kubelet[2243]: I1213 02:25:04.965898 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966174 kubelet[2243]: I1213 02:25:04.965995 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966174 kubelet[2243]: I1213 02:25:04.966086 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966660 kubelet[2243]: I1213 02:25:04.966166 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/978699fcad8303ca2d1d9b4850cfa0bc-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-f1dd79c03e\" (UID: \"978699fcad8303ca2d1d9b4850cfa0bc\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966660 kubelet[2243]: I1213 02:25:04.966247 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966660 kubelet[2243]: I1213 02:25:04.966345 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966660 kubelet[2243]: I1213 02:25:04.966446 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:04.966660 kubelet[2243]: I1213 02:25:04.966527 2243 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:05.166900 kubelet[2243]: E1213 02:25:05.166688 2243 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-f1dd79c03e?timeout=10s\": dial tcp 147.75.203.55:6443: connect: connection refused" interval="800ms" Dec 13 02:25:05.223827 env[1567]: time="2024-12-13T02:25:05.223694742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-f1dd79c03e,Uid:6a39b0caf3332c199b9e7216139d44cf,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:05.233987 env[1567]: time="2024-12-13T02:25:05.233879091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-f1dd79c03e,Uid:04455561513fe15cc427eb00be8a31af,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:05.241132 env[1567]: time="2024-12-13T02:25:05.241023289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-f1dd79c03e,Uid:978699fcad8303ca2d1d9b4850cfa0bc,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:05.276606 kubelet[2243]: I1213 02:25:05.276538 2243 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:05.277387 kubelet[2243]: E1213 02:25:05.277276 2243 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.55:6443/api/v1/nodes\": dial tcp 147.75.203.55:6443: connect: connection refused" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:05.725957 kubelet[2243]: W1213 02:25:05.725789 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.75.203.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.725957 kubelet[2243]: E1213 02:25:05.725936 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.782727 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount862114363.mount: Deactivated successfully. Dec 13 02:25:05.784141 env[1567]: time="2024-12-13T02:25:05.784093426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.785191 env[1567]: time="2024-12-13T02:25:05.785178775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.785874 env[1567]: time="2024-12-13T02:25:05.785860389Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.786645 env[1567]: time="2024-12-13T02:25:05.786634105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.787333 env[1567]: time="2024-12-13T02:25:05.787322554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.788642 env[1567]: time="2024-12-13T02:25:05.788600787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.790266 env[1567]: time="2024-12-13T02:25:05.790225756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.791449 env[1567]: time="2024-12-13T02:25:05.791421917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.791809 env[1567]: time="2024-12-13T02:25:05.791796438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.792266 env[1567]: time="2024-12-13T02:25:05.792254062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.792711 env[1567]: time="2024-12-13T02:25:05.792695400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.793196 env[1567]: time="2024-12-13T02:25:05.793180456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:05.796865 env[1567]: time="2024-12-13T02:25:05.796828356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:05.796865 env[1567]: time="2024-12-13T02:25:05.796849197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:05.796865 env[1567]: time="2024-12-13T02:25:05.796856047Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:05.796997 env[1567]: time="2024-12-13T02:25:05.796956693Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7e4fba5aef8771b220524c2002893fc6efa77fe243476b78a29d72eddb19f38 pid=2292 runtime=io.containerd.runc.v2 Dec 13 02:25:05.798547 env[1567]: time="2024-12-13T02:25:05.798511435Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:05.798547 env[1567]: time="2024-12-13T02:25:05.798535742Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:05.798547 env[1567]: time="2024-12-13T02:25:05.798542819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:05.798653 env[1567]: time="2024-12-13T02:25:05.798605964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf19034edec05b6aaa02744ef22b48898b38f0d3ff6991632a75d71363392a8f pid=2313 runtime=io.containerd.runc.v2 Dec 13 02:25:05.799446 env[1567]: time="2024-12-13T02:25:05.799415725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:05.799446 env[1567]: time="2024-12-13T02:25:05.799433168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:05.799446 env[1567]: time="2024-12-13T02:25:05.799439996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:05.799559 env[1567]: time="2024-12-13T02:25:05.799500520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb1371143e022ba6ba57cc68b7eefdcf26dd870a9a49f1e06a4dca098ef1bc8c pid=2320 runtime=io.containerd.runc.v2 Dec 13 02:25:05.803575 systemd[1]: Started cri-containerd-e7e4fba5aef8771b220524c2002893fc6efa77fe243476b78a29d72eddb19f38.scope. Dec 13 02:25:05.805806 systemd[1]: Started cri-containerd-bf19034edec05b6aaa02744ef22b48898b38f0d3ff6991632a75d71363392a8f.scope. Dec 13 02:25:05.806430 systemd[1]: Started cri-containerd-cb1371143e022ba6ba57cc68b7eefdcf26dd870a9a49f1e06a4dca098ef1bc8c.scope. Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.808000 audit: BPF prog-id=61 op=LOAD Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653466626135616566383737316232323035323463323030323839 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653466626135616566383737316232323035323463323030323839 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit: BPF prog-id=62 op=LOAD Dec 13 02:25:05.809000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000309150 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653466626135616566383737316232323035323463323030323839 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit: BPF prog-id=63 op=LOAD Dec 13 02:25:05.809000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000309198 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653466626135616566383737316232323035323463323030323839 Dec 13 02:25:05.809000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:25:05.809000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit: BPF prog-id=64 op=LOAD Dec 13 02:25:05.809000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003095a8 items=0 ppid=2292 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653466626135616566383737316232323035323463323030323839 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit: BPF prog-id=65 op=LOAD Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2313 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313930333465646563303562366161613032373434656632326234 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=2313 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313930333465646563303562366161613032373434656632326234 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.809000 audit: BPF prog-id=66 op=LOAD Dec 13 02:25:05.809000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000309320 items=0 ppid=2313 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313930333465646563303562366161613032373434656632326234 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=67 op=LOAD Dec 13 02:25:05.810000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000309368 items=0 ppid=2313 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313930333465646563303562366161613032373434656632326234 Dec 13 02:25:05.810000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:25:05.810000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=68 op=LOAD Dec 13 02:25:05.810000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000309778 items=0 ppid=2313 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313930333465646563303562366161613032373434656632326234 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=69 op=LOAD Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2320 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362313337313134336530323262613662613537636336386237656566 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2320 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362313337313134336530323262613662613537636336386237656566 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=70 op=LOAD Dec 13 02:25:05.810000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000025140 items=0 ppid=2320 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362313337313134336530323262613662613537636336386237656566 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=71 op=LOAD Dec 13 02:25:05.810000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000025188 items=0 ppid=2320 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362313337313134336530323262613662613537636336386237656566 Dec 13 02:25:05.810000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:25:05.810000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.810000 audit: BPF prog-id=72 op=LOAD Dec 13 02:25:05.810000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000025598 items=0 ppid=2320 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362313337313134336530323262613662613537636336386237656566 Dec 13 02:25:05.818166 kubelet[2243]: W1213 02:25:05.818127 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.75.203.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.818209 kubelet[2243]: E1213 02:25:05.818179 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.823593 kubelet[2243]: W1213 02:25:05.823560 2243 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.55:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.823666 kubelet[2243]: E1213 02:25:05.823600 2243 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.55:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.55:6443: connect: connection refused Dec 13 02:25:05.826397 env[1567]: time="2024-12-13T02:25:05.826355096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-f1dd79c03e,Uid:6a39b0caf3332c199b9e7216139d44cf,Namespace:kube-system,Attempt:0,} returns sandbox id \"e7e4fba5aef8771b220524c2002893fc6efa77fe243476b78a29d72eddb19f38\"" Dec 13 02:25:05.826763 env[1567]: time="2024-12-13T02:25:05.826746594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-f1dd79c03e,Uid:978699fcad8303ca2d1d9b4850cfa0bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf19034edec05b6aaa02744ef22b48898b38f0d3ff6991632a75d71363392a8f\"" Dec 13 02:25:05.828019 env[1567]: time="2024-12-13T02:25:05.827985722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-f1dd79c03e,Uid:04455561513fe15cc427eb00be8a31af,Namespace:kube-system,Attempt:0,} returns sandbox id \"cb1371143e022ba6ba57cc68b7eefdcf26dd870a9a49f1e06a4dca098ef1bc8c\"" Dec 13 02:25:05.828534 env[1567]: time="2024-12-13T02:25:05.828514738Z" level=info msg="CreateContainer within sandbox \"bf19034edec05b6aaa02744ef22b48898b38f0d3ff6991632a75d71363392a8f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:25:05.828595 env[1567]: time="2024-12-13T02:25:05.828525052Z" level=info msg="CreateContainer within sandbox \"e7e4fba5aef8771b220524c2002893fc6efa77fe243476b78a29d72eddb19f38\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:25:05.829667 env[1567]: time="2024-12-13T02:25:05.829654757Z" level=info msg="CreateContainer within sandbox \"cb1371143e022ba6ba57cc68b7eefdcf26dd870a9a49f1e06a4dca098ef1bc8c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:25:05.835566 env[1567]: time="2024-12-13T02:25:05.835521992Z" level=info msg="CreateContainer within sandbox \"bf19034edec05b6aaa02744ef22b48898b38f0d3ff6991632a75d71363392a8f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a9c872eb50b7dab8cb997ae0f5e83bb19550603bc25901d81bb33808672c1ae3\"" Dec 13 02:25:05.835791 env[1567]: time="2024-12-13T02:25:05.835770688Z" level=info msg="StartContainer for \"a9c872eb50b7dab8cb997ae0f5e83bb19550603bc25901d81bb33808672c1ae3\"" Dec 13 02:25:05.836943 env[1567]: time="2024-12-13T02:25:05.836918426Z" level=info msg="CreateContainer within sandbox \"cb1371143e022ba6ba57cc68b7eefdcf26dd870a9a49f1e06a4dca098ef1bc8c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bbc07e4857488b1e6fa7f70599c2bf9a550e1cf9d15f5498d3128f813dc211f2\"" Dec 13 02:25:05.837100 env[1567]: time="2024-12-13T02:25:05.837087843Z" level=info msg="StartContainer for \"bbc07e4857488b1e6fa7f70599c2bf9a550e1cf9d15f5498d3128f813dc211f2\"" Dec 13 02:25:05.837187 env[1567]: time="2024-12-13T02:25:05.837170223Z" level=info msg="CreateContainer within sandbox \"e7e4fba5aef8771b220524c2002893fc6efa77fe243476b78a29d72eddb19f38\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"208cc867efdd9557d3ececf2dda91ca07f4f1781205c2f9b1dd9ad0d3cc20311\"" Dec 13 02:25:05.837334 env[1567]: time="2024-12-13T02:25:05.837323183Z" level=info msg="StartContainer for \"208cc867efdd9557d3ececf2dda91ca07f4f1781205c2f9b1dd9ad0d3cc20311\"" Dec 13 02:25:05.843412 systemd[1]: Started cri-containerd-a9c872eb50b7dab8cb997ae0f5e83bb19550603bc25901d81bb33808672c1ae3.scope. Dec 13 02:25:05.845396 systemd[1]: Started cri-containerd-208cc867efdd9557d3ececf2dda91ca07f4f1781205c2f9b1dd9ad0d3cc20311.scope. Dec 13 02:25:05.846039 systemd[1]: Started cri-containerd-bbc07e4857488b1e6fa7f70599c2bf9a550e1cf9d15f5498d3128f813dc211f2.scope. Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit: BPF prog-id=73 op=LOAD Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2313 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633837326562353062376461623863623939376165306635653833 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2313 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633837326562353062376461623863623939376165306635653833 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit: BPF prog-id=74 op=LOAD Dec 13 02:25:05.849000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000301490 items=0 ppid=2313 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633837326562353062376461623863623939376165306635653833 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit: BPF prog-id=75 op=LOAD Dec 13 02:25:05.849000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003014d8 items=0 ppid=2313 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633837326562353062376461623863623939376165306635653833 Dec 13 02:25:05.849000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:25:05.849000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit: BPF prog-id=76 op=LOAD Dec 13 02:25:05.849000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003018e8 items=0 ppid=2313 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633837326562353062376461623863623939376165306635653833 Dec 13 02:25:05.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit: BPF prog-id=77 op=LOAD Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2292 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230386363383637656664643935353764336563656366326464613931 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2292 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230386363383637656664643935353764336563656366326464613931 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit: BPF prog-id=78 op=LOAD Dec 13 02:25:05.850000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003013b0 items=0 ppid=2292 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230386363383637656664643935353764336563656366326464613931 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit: BPF prog-id=79 op=LOAD Dec 13 02:25:05.850000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003013f8 items=0 ppid=2292 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230386363383637656664643935353764336563656366326464613931 Dec 13 02:25:05.850000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:25:05.850000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.850000 audit: BPF prog-id=80 op=LOAD Dec 13 02:25:05.850000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000301808 items=0 ppid=2292 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230386363383637656664643935353764336563656366326464613931 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit: BPF prog-id=81 op=LOAD Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2320 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262633037653438353734383862316536666137663730353939633262 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2320 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262633037653438353734383862316536666137663730353939633262 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit: BPF prog-id=82 op=LOAD Dec 13 02:25:05.853000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000337d40 items=0 ppid=2320 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262633037653438353734383862316536666137663730353939633262 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit: BPF prog-id=83 op=LOAD Dec 13 02:25:05.853000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000337d88 items=0 ppid=2320 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262633037653438353734383862316536666137663730353939633262 Dec 13 02:25:05.853000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:25:05.853000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:05.853000 audit: BPF prog-id=84 op=LOAD Dec 13 02:25:05.853000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00039e198 items=0 ppid=2320 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:05.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262633037653438353734383862316536666137663730353939633262 Dec 13 02:25:05.868452 env[1567]: time="2024-12-13T02:25:05.868426182Z" level=info msg="StartContainer for \"208cc867efdd9557d3ececf2dda91ca07f4f1781205c2f9b1dd9ad0d3cc20311\" returns successfully" Dec 13 02:25:05.870959 env[1567]: time="2024-12-13T02:25:05.870932029Z" level=info msg="StartContainer for \"a9c872eb50b7dab8cb997ae0f5e83bb19550603bc25901d81bb33808672c1ae3\" returns successfully" Dec 13 02:25:05.871096 env[1567]: time="2024-12-13T02:25:05.871075713Z" level=info msg="StartContainer for \"bbc07e4857488b1e6fa7f70599c2bf9a550e1cf9d15f5498d3128f813dc211f2\" returns successfully" Dec 13 02:25:06.079677 kubelet[2243]: I1213 02:25:06.079611 2243 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:06.425000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.425000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000399470 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:06.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:06.425000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.425000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00069e6a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:06.425000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00518c0c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0070ba030 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004738000 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0043b3350 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0047a0060 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.584000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:06.584000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0040dc0f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:25:06.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:25:06.596639 kubelet[2243]: E1213 02:25:06.596623 2243 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-f1dd79c03e\" not found" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:06.697887 kubelet[2243]: I1213 02:25:06.697784 2243 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:07.536841 kubelet[2243]: I1213 02:25:07.536754 2243 apiserver.go:52] "Watching apiserver" Dec 13 02:25:07.563471 kubelet[2243]: I1213 02:25:07.563423 2243 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:25:07.616408 kubelet[2243]: W1213 02:25:07.616324 2243 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:09.095873 systemd[1]: Reloading. Dec 13 02:25:09.134754 /usr/lib/systemd/system-generators/torcx-generator[2571]: time="2024-12-13T02:25:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:25:09.134779 /usr/lib/systemd/system-generators/torcx-generator[2571]: time="2024-12-13T02:25:09Z" level=info msg="torcx already run" Dec 13 02:25:09.197024 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:25:09.197034 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:25:09.210879 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.290325 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 02:25:09.290399 kernel: audit: type=1400 audit(1734056709.262:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.415830 kernel: audit: type=1400 audit(1734056709.262:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.415905 kernel: audit: type=1400 audit(1734056709.262:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.479473 kernel: audit: type=1400 audit(1734056709.262:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.543977 kernel: audit: type=1400 audit(1734056709.262:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607924 kernel: audit: type=1400 audit(1734056709.262:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.671723 kernel: audit: type=1400 audit(1734056709.262:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.800322 kernel: audit: type=1400 audit(1734056709.262:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.800373 kernel: audit: type=1400 audit(1734056709.262:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.864291 kernel: audit: type=1400 audit(1734056709.414:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit: BPF prog-id=85 op=LOAD Dec 13 02:25:09.414000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.606000 audit: BPF prog-id=86 op=LOAD Dec 13 02:25:09.606000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit: BPF prog-id=87 op=LOAD Dec 13 02:25:09.734000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.862000 audit: BPF prog-id=88 op=LOAD Dec 13 02:25:09.862000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit: BPF prog-id=89 op=LOAD Dec 13 02:25:09.926000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit: BPF prog-id=90 op=LOAD Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit: BPF prog-id=91 op=LOAD Dec 13 02:25:09.926000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:25:09.926000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.926000 audit: BPF prog-id=92 op=LOAD Dec 13 02:25:09.926000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.927000 audit: BPF prog-id=93 op=LOAD Dec 13 02:25:09.927000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.928000 audit: BPF prog-id=94 op=LOAD Dec 13 02:25:09.928000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.929000 audit: BPF prog-id=95 op=LOAD Dec 13 02:25:09.929000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.930000 audit: BPF prog-id=96 op=LOAD Dec 13 02:25:09.930000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit: BPF prog-id=97 op=LOAD Dec 13 02:25:09.931000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit: BPF prog-id=98 op=LOAD Dec 13 02:25:09.932000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit: BPF prog-id=99 op=LOAD Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.932000 audit: BPF prog-id=100 op=LOAD Dec 13 02:25:09.932000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:25:09.932000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit: BPF prog-id=101 op=LOAD Dec 13 02:25:09.934000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit: BPF prog-id=102 op=LOAD Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.934000 audit: BPF prog-id=103 op=LOAD Dec 13 02:25:09.934000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:25:09.934000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit: BPF prog-id=104 op=LOAD Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:09.935000 audit: BPF prog-id=105 op=LOAD Dec 13 02:25:09.935000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:25:09.935000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:25:09.944119 systemd[1]: Stopping kubelet.service... Dec 13 02:25:09.969727 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:25:09.969856 systemd[1]: Stopped kubelet.service. Dec 13 02:25:09.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:09.970795 systemd[1]: Starting kubelet.service... Dec 13 02:25:10.148831 systemd[1]: Started kubelet.service. Dec 13 02:25:10.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:10.170280 kubelet[2635]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:25:10.170280 kubelet[2635]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:25:10.170280 kubelet[2635]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:25:10.170510 kubelet[2635]: I1213 02:25:10.170305 2635 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:25:10.172772 kubelet[2635]: I1213 02:25:10.172722 2635 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:25:10.172772 kubelet[2635]: I1213 02:25:10.172733 2635 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:25:10.172835 kubelet[2635]: I1213 02:25:10.172827 2635 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:25:10.173540 kubelet[2635]: I1213 02:25:10.173504 2635 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:25:10.174102 kubelet[2635]: I1213 02:25:10.174074 2635 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:25:10.192900 kubelet[2635]: I1213 02:25:10.192851 2635 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:25:10.192984 kubelet[2635]: I1213 02:25:10.192958 2635 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:25:10.193075 kubelet[2635]: I1213 02:25:10.192976 2635 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-f1dd79c03e","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:25:10.193150 kubelet[2635]: I1213 02:25:10.193082 2635 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:25:10.193150 kubelet[2635]: I1213 02:25:10.193089 2635 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:25:10.193150 kubelet[2635]: I1213 02:25:10.193113 2635 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:25:10.193243 kubelet[2635]: I1213 02:25:10.193157 2635 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:25:10.193243 kubelet[2635]: I1213 02:25:10.193164 2635 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:25:10.193243 kubelet[2635]: I1213 02:25:10.193176 2635 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:25:10.193243 kubelet[2635]: I1213 02:25:10.193184 2635 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:25:10.193540 kubelet[2635]: I1213 02:25:10.193523 2635 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:25:10.193655 kubelet[2635]: I1213 02:25:10.193647 2635 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:25:10.193914 kubelet[2635]: I1213 02:25:10.193907 2635 server.go:1264] "Started kubelet" Dec 13 02:25:10.193988 kubelet[2635]: I1213 02:25:10.193952 2635 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:25:10.194120 kubelet[2635]: I1213 02:25:10.194112 2635 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:25:10.194312 kubelet[2635]: I1213 02:25:10.193929 2635 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:25:10.193000 audit[2635]: AVC avc: denied { mac_admin } for pid=2635 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:10.193000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:10.193000 audit[2635]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000813980 a1=c0006b0888 a2=c000813950 a3=25 items=0 ppid=1 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:10.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:10.193000 audit[2635]: AVC avc: denied { mac_admin } for pid=2635 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:10.193000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:10.193000 audit[2635]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008be440 a1=c0006b08a0 a2=c000813a10 a3=25 items=0 ppid=1 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:10.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:10.194988 kubelet[2635]: I1213 02:25:10.194726 2635 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:25:10.194988 kubelet[2635]: I1213 02:25:10.194755 2635 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:25:10.194988 kubelet[2635]: I1213 02:25:10.194771 2635 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:25:10.194988 kubelet[2635]: I1213 02:25:10.194860 2635 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:25:10.194988 kubelet[2635]: I1213 02:25:10.194894 2635 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:25:10.195317 kubelet[2635]: I1213 02:25:10.195303 2635 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:25:10.195540 kubelet[2635]: E1213 02:25:10.195525 2635 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:25:10.196101 kubelet[2635]: I1213 02:25:10.196091 2635 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:25:10.196975 kubelet[2635]: I1213 02:25:10.196963 2635 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:25:10.197036 kubelet[2635]: I1213 02:25:10.197024 2635 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:25:10.197580 kubelet[2635]: I1213 02:25:10.197569 2635 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:25:10.199649 kubelet[2635]: I1213 02:25:10.199626 2635 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:25:10.200765 kubelet[2635]: I1213 02:25:10.200748 2635 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:25:10.200828 kubelet[2635]: I1213 02:25:10.200775 2635 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:25:10.200828 kubelet[2635]: I1213 02:25:10.200790 2635 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:25:10.200901 kubelet[2635]: E1213 02:25:10.200822 2635 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:25:10.212153 kubelet[2635]: I1213 02:25:10.212139 2635 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:25:10.212153 kubelet[2635]: I1213 02:25:10.212150 2635 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:25:10.212254 kubelet[2635]: I1213 02:25:10.212162 2635 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:25:10.212282 kubelet[2635]: I1213 02:25:10.212274 2635 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:25:10.212307 kubelet[2635]: I1213 02:25:10.212284 2635 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:25:10.212307 kubelet[2635]: I1213 02:25:10.212299 2635 policy_none.go:49] "None policy: Start" Dec 13 02:25:10.212630 kubelet[2635]: I1213 02:25:10.212589 2635 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:25:10.212630 kubelet[2635]: I1213 02:25:10.212601 2635 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:25:10.212685 kubelet[2635]: I1213 02:25:10.212669 2635 state_mem.go:75] "Updated machine memory state" Dec 13 02:25:10.214447 kubelet[2635]: I1213 02:25:10.214439 2635 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:25:10.213000 audit[2635]: AVC avc: denied { mac_admin } for pid=2635 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:10.213000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:25:10.213000 audit[2635]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005f5620 a1=c000e77170 a2=c0005f55f0 a3=25 items=0 ppid=1 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:10.213000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:25:10.214652 kubelet[2635]: I1213 02:25:10.214465 2635 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:25:10.214652 kubelet[2635]: I1213 02:25:10.214531 2635 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:25:10.214652 kubelet[2635]: I1213 02:25:10.214578 2635 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:25:10.301106 kubelet[2635]: I1213 02:25:10.301022 2635 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.301330 kubelet[2635]: I1213 02:25:10.301111 2635 topology_manager.go:215] "Topology Admit Handler" podUID="6a39b0caf3332c199b9e7216139d44cf" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.301476 kubelet[2635]: I1213 02:25:10.301349 2635 topology_manager.go:215] "Topology Admit Handler" podUID="04455561513fe15cc427eb00be8a31af" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.301669 kubelet[2635]: I1213 02:25:10.301591 2635 topology_manager.go:215] "Topology Admit Handler" podUID="978699fcad8303ca2d1d9b4850cfa0bc" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.308486 kubelet[2635]: W1213 02:25:10.308441 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:10.308486 kubelet[2635]: W1213 02:25:10.308483 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:10.310387 kubelet[2635]: W1213 02:25:10.310350 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:10.310501 kubelet[2635]: E1213 02:25:10.310456 2635 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.311520 kubelet[2635]: I1213 02:25:10.311492 2635 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.311649 kubelet[2635]: I1213 02:25:10.311569 2635 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495763 kubelet[2635]: I1213 02:25:10.495706 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495763 kubelet[2635]: I1213 02:25:10.495731 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495763 kubelet[2635]: I1213 02:25:10.495743 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495763 kubelet[2635]: I1213 02:25:10.495754 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495763 kubelet[2635]: I1213 02:25:10.495764 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495909 kubelet[2635]: I1213 02:25:10.495773 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/978699fcad8303ca2d1d9b4850cfa0bc-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-f1dd79c03e\" (UID: \"978699fcad8303ca2d1d9b4850cfa0bc\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495909 kubelet[2635]: I1213 02:25:10.495783 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495909 kubelet[2635]: I1213 02:25:10.495815 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04455561513fe15cc427eb00be8a31af-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" (UID: \"04455561513fe15cc427eb00be8a31af\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:10.495909 kubelet[2635]: I1213 02:25:10.495838 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a39b0caf3332c199b9e7216139d44cf-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" (UID: \"6a39b0caf3332c199b9e7216139d44cf\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:11.193529 kubelet[2635]: I1213 02:25:11.193461 2635 apiserver.go:52] "Watching apiserver" Dec 13 02:25:11.195992 kubelet[2635]: I1213 02:25:11.195949 2635 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:25:11.209724 kubelet[2635]: W1213 02:25:11.209706 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:11.209724 kubelet[2635]: W1213 02:25:11.209722 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:11.209857 kubelet[2635]: E1213 02:25:11.209742 2635 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-f1dd79c03e\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:11.209857 kubelet[2635]: E1213 02:25:11.209752 2635 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.6-a-f1dd79c03e\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:11.210131 kubelet[2635]: W1213 02:25:11.210122 2635 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 02:25:11.210162 kubelet[2635]: E1213 02:25:11.210152 2635 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-a-f1dd79c03e\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:11.216552 kubelet[2635]: I1213 02:25:11.216521 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-f1dd79c03e" podStartSLOduration=4.216510852 podStartE2EDuration="4.216510852s" podCreationTimestamp="2024-12-13 02:25:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:11.216415113 +0000 UTC m=+1.065513449" watchObservedRunningTime="2024-12-13 02:25:11.216510852 +0000 UTC m=+1.065609187" Dec 13 02:25:11.229489 kubelet[2635]: I1213 02:25:11.229458 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-f1dd79c03e" podStartSLOduration=1.229445684 podStartE2EDuration="1.229445684s" podCreationTimestamp="2024-12-13 02:25:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:11.229434801 +0000 UTC m=+1.078533137" watchObservedRunningTime="2024-12-13 02:25:11.229445684 +0000 UTC m=+1.078544020" Dec 13 02:25:11.234630 kubelet[2635]: I1213 02:25:11.234561 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-f1dd79c03e" podStartSLOduration=1.234544552 podStartE2EDuration="1.234544552s" podCreationTimestamp="2024-12-13 02:25:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:11.234532798 +0000 UTC m=+1.083631133" watchObservedRunningTime="2024-12-13 02:25:11.234544552 +0000 UTC m=+1.083642884" Dec 13 02:25:11.580000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:25:11.580000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00110a780 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:11.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:13.788867 sudo[1781]: pam_unix(sudo:session): session closed for user root Dec 13 02:25:13.788000 audit[1781]: USER_END pid=1781 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:25:13.788000 audit[1781]: CRED_DISP pid=1781 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:25:13.789597 sshd[1778]: pam_unix(sshd:session): session closed for user core Dec 13 02:25:13.789000 audit[1778]: USER_END pid=1778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:25:13.790000 audit[1778]: CRED_DISP pid=1778 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:25:13.791073 systemd[1]: sshd@8-147.75.203.55:22-139.178.68.195:53892.service: Deactivated successfully. Dec 13 02:25:13.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.55:22-139.178.68.195:53892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:25:13.791532 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:25:13.791612 systemd[1]: session-11.scope: Consumed 3.199s CPU time. Dec 13 02:25:13.791992 systemd-logind[1559]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:25:13.792524 systemd-logind[1559]: Removed session 11. Dec 13 02:25:16.983647 update_engine[1561]: I1213 02:25:16.983536 1561 update_attempter.cc:509] Updating boot flags... Dec 13 02:25:23.924000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:23.958336 kernel: kauditd_printk_skb: 256 callbacks suppressed Dec 13 02:25:23.958545 kernel: audit: type=1400 audit(1734056723.924:807): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:23.970520 kubelet[2635]: I1213 02:25:23.970498 2635 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:25:23.970763 env[1567]: time="2024-12-13T02:25:23.970717275Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:25:23.970891 kubelet[2635]: I1213 02:25:23.970813 2635 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:25:24.012250 kubelet[2635]: I1213 02:25:24.012220 2635 topology_manager.go:215] "Topology Admit Handler" podUID="da0095e5-5c53-4def-b609-df9c241bc9de" podNamespace="kube-system" podName="kube-proxy-dc4ms" Dec 13 02:25:24.014860 systemd[1]: Created slice kubepods-besteffort-podda0095e5_5c53_4def_b609_df9c241bc9de.slice. Dec 13 02:25:23.924000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d31ba0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:24.168094 kernel: audit: type=1300 audit(1734056723.924:807): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d31ba0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:24.168162 kernel: audit: type=1327 audit(1734056723.924:807): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:23.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:24.176468 kubelet[2635]: I1213 02:25:24.176422 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/da0095e5-5c53-4def-b609-df9c241bc9de-kube-proxy\") pod \"kube-proxy-dc4ms\" (UID: \"da0095e5-5c53-4def-b609-df9c241bc9de\") " pod="kube-system/kube-proxy-dc4ms" Dec 13 02:25:24.176468 kubelet[2635]: I1213 02:25:24.176440 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/da0095e5-5c53-4def-b609-df9c241bc9de-lib-modules\") pod \"kube-proxy-dc4ms\" (UID: \"da0095e5-5c53-4def-b609-df9c241bc9de\") " pod="kube-system/kube-proxy-dc4ms" Dec 13 02:25:24.176468 kubelet[2635]: I1213 02:25:24.176456 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/da0095e5-5c53-4def-b609-df9c241bc9de-xtables-lock\") pod \"kube-proxy-dc4ms\" (UID: \"da0095e5-5c53-4def-b609-df9c241bc9de\") " pod="kube-system/kube-proxy-dc4ms" Dec 13 02:25:24.176468 kubelet[2635]: I1213 02:25:24.176468 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ms7m8\" (UniqueName: \"kubernetes.io/projected/da0095e5-5c53-4def-b609-df9c241bc9de-kube-api-access-ms7m8\") pod \"kube-proxy-dc4ms\" (UID: \"da0095e5-5c53-4def-b609-df9c241bc9de\") " pod="kube-system/kube-proxy-dc4ms" Dec 13 02:25:23.925000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:24.280625 kubelet[2635]: E1213 02:25:24.280577 2635 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 02:25:24.280625 kubelet[2635]: E1213 02:25:24.280591 2635 projected.go:200] Error preparing data for projected volume kube-api-access-ms7m8 for pod kube-system/kube-proxy-dc4ms: configmap "kube-root-ca.crt" not found Dec 13 02:25:24.280625 kubelet[2635]: E1213 02:25:24.280620 2635 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/da0095e5-5c53-4def-b609-df9c241bc9de-kube-api-access-ms7m8 podName:da0095e5-5c53-4def-b609-df9c241bc9de nodeName:}" failed. No retries permitted until 2024-12-13 02:25:24.780609595 +0000 UTC m=+14.629707931 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ms7m8" (UniqueName: "kubernetes.io/projected/da0095e5-5c53-4def-b609-df9c241bc9de-kube-api-access-ms7m8") pod "kube-proxy-dc4ms" (UID: "da0095e5-5c53-4def-b609-df9c241bc9de") : configmap "kube-root-ca.crt" not found Dec 13 02:25:24.352057 kernel: audit: type=1400 audit(1734056723.925:808): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:24.352129 kernel: audit: type=1300 audit(1734056723.925:808): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d31be0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:23.925000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d31be0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:24.452936 kubelet[2635]: I1213 02:25:24.452878 2635 topology_manager.go:215] "Topology Admit Handler" podUID="fafa9999-8d3a-4486-85b7-bb0e180b81da" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-zs7xs" Dec 13 02:25:24.472916 kernel: audit: type=1327 audit(1734056723.925:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:23.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:24.478524 kubelet[2635]: I1213 02:25:24.478500 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ck7cd\" (UniqueName: \"kubernetes.io/projected/fafa9999-8d3a-4486-85b7-bb0e180b81da-kube-api-access-ck7cd\") pod \"tigera-operator-7bc55997bb-zs7xs\" (UID: \"fafa9999-8d3a-4486-85b7-bb0e180b81da\") " pod="tigera-operator/tigera-operator-7bc55997bb-zs7xs" Dec 13 02:25:24.478596 kubelet[2635]: I1213 02:25:24.478536 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fafa9999-8d3a-4486-85b7-bb0e180b81da-var-lib-calico\") pod \"tigera-operator-7bc55997bb-zs7xs\" (UID: \"fafa9999-8d3a-4486-85b7-bb0e180b81da\") " pod="tigera-operator/tigera-operator-7bc55997bb-zs7xs" Dec 13 02:25:24.566449 kernel: audit: type=1400 audit(1734056723.926:809): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:23.926000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:24.570383 systemd[1]: Created slice kubepods-besteffort-podfafa9999_8d3a_4486_85b7_bb0e180b81da.slice. Dec 13 02:25:23.926000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c2020 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:24.777643 kernel: audit: type=1300 audit(1734056723.926:809): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c2020 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:24.777682 kernel: audit: type=1327 audit(1734056723.926:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:23.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:24.871509 kernel: audit: type=1400 audit(1734056723.927:810): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:23.927000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:25:24.871633 env[1567]: time="2024-12-13T02:25:24.871586401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-zs7xs,Uid:fafa9999-8d3a-4486-85b7-bb0e180b81da,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:25:24.878155 env[1567]: time="2024-12-13T02:25:24.878126308Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:24.878155 env[1567]: time="2024-12-13T02:25:24.878147077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:24.878245 env[1567]: time="2024-12-13T02:25:24.878153911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:24.878245 env[1567]: time="2024-12-13T02:25:24.878217208Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ab12affe34a9b96bba3fdb61a6a80217f9a8083ab952a18d6fc26745a2b33b2 pid=2822 runtime=io.containerd.runc.v2 Dec 13 02:25:24.885924 systemd[1]: Started cri-containerd-5ab12affe34a9b96bba3fdb61a6a80217f9a8083ab952a18d6fc26745a2b33b2.scope. Dec 13 02:25:23.927000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131b9a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:25:23.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit: BPF prog-id=106 op=LOAD Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2822 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:24.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623132616666653334613962393662626133666462363161366138 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2822 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:24.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623132616666653334613962393662626133666462363161366138 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit: BPF prog-id=107 op=LOAD Dec 13 02:25:24.968000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00037e740 items=0 ppid=2822 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:24.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623132616666653334613962393662626133666462363161366138 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit: BPF prog-id=108 op=LOAD Dec 13 02:25:24.968000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00037e788 items=0 ppid=2822 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:24.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623132616666653334613962393662626133666462363161366138 Dec 13 02:25:24.968000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:25:24.968000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:24.968000 audit: BPF prog-id=109 op=LOAD Dec 13 02:25:24.968000 audit[2832]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00037eb98 items=0 ppid=2822 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:24.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623132616666653334613962393662626133666462363161366138 Dec 13 02:25:24.985445 env[1567]: time="2024-12-13T02:25:24.985421175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-zs7xs,Uid:fafa9999-8d3a-4486-85b7-bb0e180b81da,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5ab12affe34a9b96bba3fdb61a6a80217f9a8083ab952a18d6fc26745a2b33b2\"" Dec 13 02:25:24.986229 env[1567]: time="2024-12-13T02:25:24.986214762Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:25:25.169817 env[1567]: time="2024-12-13T02:25:25.169620506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dc4ms,Uid:da0095e5-5c53-4def-b609-df9c241bc9de,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:25.191289 env[1567]: time="2024-12-13T02:25:25.191131668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:25.191289 env[1567]: time="2024-12-13T02:25:25.191218537Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:25.191289 env[1567]: time="2024-12-13T02:25:25.191271831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:25.191843 env[1567]: time="2024-12-13T02:25:25.191699495Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b63317ec5a82375a99e246e36e5b8e901626daca187ef149381b493e0d4c4d8 pid=2863 runtime=io.containerd.runc.v2 Dec 13 02:25:25.206152 systemd[1]: Started cri-containerd-2b63317ec5a82375a99e246e36e5b8e901626daca187ef149381b493e0d4c4d8.scope. Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit: BPF prog-id=110 op=LOAD Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363333313765633561383233373561393965323436653336653562 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363333313765633561383233373561393965323436653336653562 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.210000 audit: BPF prog-id=111 op=LOAD Dec 13 02:25:25.210000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000329d10 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363333313765633561383233373561393965323436653336653562 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit: BPF prog-id=112 op=LOAD Dec 13 02:25:25.211000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000329d58 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363333313765633561383233373561393965323436653336653562 Dec 13 02:25:25.211000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:25:25.211000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.211000 audit: BPF prog-id=113 op=LOAD Dec 13 02:25:25.211000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037c168 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363333313765633561383233373561393965323436653336653562 Dec 13 02:25:25.217026 env[1567]: time="2024-12-13T02:25:25.217002113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dc4ms,Uid:da0095e5-5c53-4def-b609-df9c241bc9de,Namespace:kube-system,Attempt:0,} returns sandbox id \"2b63317ec5a82375a99e246e36e5b8e901626daca187ef149381b493e0d4c4d8\"" Dec 13 02:25:25.218143 env[1567]: time="2024-12-13T02:25:25.218130624Z" level=info msg="CreateContainer within sandbox \"2b63317ec5a82375a99e246e36e5b8e901626daca187ef149381b493e0d4c4d8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:25:25.223535 env[1567]: time="2024-12-13T02:25:25.223487646Z" level=info msg="CreateContainer within sandbox \"2b63317ec5a82375a99e246e36e5b8e901626daca187ef149381b493e0d4c4d8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cc6ea6ec1df57b712e7190b329009ccd82fca126ecb5dd186e4ae578be6e24cf\"" Dec 13 02:25:25.223723 env[1567]: time="2024-12-13T02:25:25.223710842Z" level=info msg="StartContainer for \"cc6ea6ec1df57b712e7190b329009ccd82fca126ecb5dd186e4ae578be6e24cf\"" Dec 13 02:25:25.232348 systemd[1]: Started cri-containerd-cc6ea6ec1df57b712e7190b329009ccd82fca126ecb5dd186e4ae578be6e24cf.scope. Dec 13 02:25:25.239000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.239000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f59d7fc2b58 items=0 ppid=2863 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366561366563316466353762373132653731393062333239303039 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit: BPF prog-id=114 op=LOAD Dec 13 02:25:25.240000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bba8 items=0 ppid=2863 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366561366563316466353762373132653731393062333239303039 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit: BPF prog-id=115 op=LOAD Dec 13 02:25:25.240000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bbf8 items=0 ppid=2863 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366561366563316466353762373132653731393062333239303039 Dec 13 02:25:25.240000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:25:25.240000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:25.240000 audit: BPF prog-id=116 op=LOAD Dec 13 02:25:25.240000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034bc88 items=0 ppid=2863 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366561366563316466353762373132653731393062333239303039 Dec 13 02:25:25.247891 env[1567]: time="2024-12-13T02:25:25.247837723Z" level=info msg="StartContainer for \"cc6ea6ec1df57b712e7190b329009ccd82fca126ecb5dd186e4ae578be6e24cf\" returns successfully" Dec 13 02:25:25.283000 audit[2964]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.283000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3b9bf020 a2=0 a3=7fff3b9bf00c items=0 ppid=2913 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:25:25.283000 audit[2965]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.283000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc22622f60 a2=0 a3=7ffc22622f4c items=0 ppid=2913 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:25:25.284000 audit[2966]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.284000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff71113d30 a2=0 a3=7fff71113d1c items=0 ppid=2913 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:25:25.284000 audit[2967]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.284000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc749bf630 a2=0 a3=7ffc749bf61c items=0 ppid=2913 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:25:25.285000 audit[2971]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.285000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcac52eac0 a2=0 a3=7ffcac52eaac items=0 ppid=2913 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:25:25.285000 audit[2970]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.285000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1fcd3990 a2=0 a3=7fff1fcd397c items=0 ppid=2913 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:25:25.387000 audit[2972]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.387000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe200e1220 a2=0 a3=7ffe200e120c items=0 ppid=2913 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:25:25.394000 audit[2974]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.394000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff7d8090a0 a2=0 a3=7fff7d80908c items=0 ppid=2913 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:25:25.403000 audit[2977]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.403000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffc1a94b20 a2=0 a3=7fffc1a94b0c items=0 ppid=2913 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:25:25.406000 audit[2978]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.406000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca52189e0 a2=0 a3=7ffca52189cc items=0 ppid=2913 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:25:25.412000 audit[2980]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.412000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff85a3ed30 a2=0 a3=7fff85a3ed1c items=0 ppid=2913 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:25:25.414000 audit[2981]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.414000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe666b2a0 a2=0 a3=7fffe666b28c items=0 ppid=2913 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:25:25.421000 audit[2983]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.421000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff1d593e0 a2=0 a3=7ffff1d593cc items=0 ppid=2913 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:25:25.430000 audit[2986]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.430000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7fb831a0 a2=0 a3=7ffc7fb8318c items=0 ppid=2913 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:25:25.433000 audit[2987]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.433000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd151633f0 a2=0 a3=7ffd151633dc items=0 ppid=2913 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:25:25.439000 audit[2989]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.439000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6b090a90 a2=0 a3=7ffd6b090a7c items=0 ppid=2913 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:25:25.441000 audit[2990]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.441000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec0807060 a2=0 a3=7ffec080704c items=0 ppid=2913 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:25:25.448000 audit[2992]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.448000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff21317870 a2=0 a3=7fff2131785c items=0 ppid=2913 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:25:25.457000 audit[2995]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.457000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8eb4a1c0 a2=0 a3=7ffe8eb4a1ac items=0 ppid=2913 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:25:25.466000 audit[2998]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.466000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9299fde0 a2=0 a3=7fff9299fdcc items=0 ppid=2913 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:25:25.469000 audit[2999]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.469000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde4bbe7c0 a2=0 a3=7ffde4bbe7ac items=0 ppid=2913 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:25:25.475000 audit[3001]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.475000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffde68c800 a2=0 a3=7fffde68c7ec items=0 ppid=2913 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:25:25.483000 audit[3004]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.483000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8c23c390 a2=0 a3=7ffc8c23c37c items=0 ppid=2913 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:25:25.486000 audit[3005]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.486000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0303cc50 a2=0 a3=7ffc0303cc3c items=0 ppid=2913 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:25:25.492000 audit[3007]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:25:25.492000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe16af1660 a2=0 a3=7ffe16af164c items=0 ppid=2913 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:25:25.547000 audit[3013]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:25.547000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe97ca38c0 a2=0 a3=7ffe97ca38ac items=0 ppid=2913 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:25.569000 audit[3013]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:25.569000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe97ca38c0 a2=0 a3=7ffe97ca38ac items=0 ppid=2913 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:25.572000 audit[3018]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.572000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcba515380 a2=0 a3=7ffcba51536c items=0 ppid=2913 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:25:25.579000 audit[3020]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.579000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff26b63f70 a2=0 a3=7fff26b63f5c items=0 ppid=2913 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:25:25.588000 audit[3023]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.588000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff2d796030 a2=0 a3=7fff2d79601c items=0 ppid=2913 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:25:25.591000 audit[3024]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.591000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0a1db410 a2=0 a3=7fff0a1db3fc items=0 ppid=2913 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:25:25.597000 audit[3026]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.597000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff196fa110 a2=0 a3=7fff196fa0fc items=0 ppid=2913 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:25:25.599000 audit[3027]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.599000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea71355c0 a2=0 a3=7ffea71355ac items=0 ppid=2913 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:25:25.606000 audit[3029]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.606000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb4170050 a2=0 a3=7ffdb417003c items=0 ppid=2913 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:25:25.614000 audit[3032]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.614000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff9ef6ea0 a2=0 a3=7ffff9ef6e8c items=0 ppid=2913 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:25:25.617000 audit[3033]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.617000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffc9fedb0 a2=0 a3=7ffffc9fed9c items=0 ppid=2913 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:25:25.624000 audit[3035]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.624000 audit[3035]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0cda2040 a2=0 a3=7ffd0cda202c items=0 ppid=2913 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:25:25.626000 audit[3036]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.626000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb90133d0 a2=0 a3=7ffdb90133bc items=0 ppid=2913 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:25:25.633000 audit[3038]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.633000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc69148730 a2=0 a3=7ffc6914871c items=0 ppid=2913 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:25:25.642000 audit[3041]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3041 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.642000 audit[3041]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8be12930 a2=0 a3=7ffe8be1291c items=0 ppid=2913 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:25:25.650000 audit[3044]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.650000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf512bb30 a2=0 a3=7ffdf512bb1c items=0 ppid=2913 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:25:25.653000 audit[3045]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3045 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.653000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc30adec50 a2=0 a3=7ffc30adec3c items=0 ppid=2913 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:25:25.659000 audit[3047]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.659000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffec42ca00 a2=0 a3=7fffec42c9ec items=0 ppid=2913 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:25:25.667000 audit[3050]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.667000 audit[3050]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc2a94e2e0 a2=0 a3=7ffc2a94e2cc items=0 ppid=2913 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:25:25.670000 audit[3051]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.670000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7ce423c0 a2=0 a3=7fff7ce423ac items=0 ppid=2913 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:25:25.676000 audit[3053]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.676000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffe0a57ca0 a2=0 a3=7fffe0a57c8c items=0 ppid=2913 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:25:25.678000 audit[3054]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.678000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc22993750 a2=0 a3=7ffc2299373c items=0 ppid=2913 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:25:25.684000 audit[3056]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.684000 audit[3056]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1be33a10 a2=0 a3=7fff1be339fc items=0 ppid=2913 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:25:25.693000 audit[3059]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:25:25.693000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd6e9a3fd0 a2=0 a3=7ffd6e9a3fbc items=0 ppid=2913 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:25:25.700000 audit[3061]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:25:25.700000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff3f646bc0 a2=0 a3=7fff3f646bac items=0 ppid=2913 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.700000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:25.701000 audit[3061]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:25:25.701000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff3f646bc0 a2=0 a3=7fff3f646bac items=0 ppid=2913 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:25.701000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:26.259756 kubelet[2635]: I1213 02:25:26.259655 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dc4ms" podStartSLOduration=2.259619362 podStartE2EDuration="2.259619362s" podCreationTimestamp="2024-12-13 02:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:26.259617945 +0000 UTC m=+16.108716341" watchObservedRunningTime="2024-12-13 02:25:26.259619362 +0000 UTC m=+16.108717741" Dec 13 02:25:27.272382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount973306844.mount: Deactivated successfully. Dec 13 02:25:27.945017 env[1567]: time="2024-12-13T02:25:27.944994392Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:27.945710 env[1567]: time="2024-12-13T02:25:27.945696981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:27.946573 env[1567]: time="2024-12-13T02:25:27.946560389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:27.947245 env[1567]: time="2024-12-13T02:25:27.947233800Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:27.947926 env[1567]: time="2024-12-13T02:25:27.947890111Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:25:27.949272 env[1567]: time="2024-12-13T02:25:27.949259616Z" level=info msg="CreateContainer within sandbox \"5ab12affe34a9b96bba3fdb61a6a80217f9a8083ab952a18d6fc26745a2b33b2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:25:27.953585 env[1567]: time="2024-12-13T02:25:27.953547796Z" level=info msg="CreateContainer within sandbox \"5ab12affe34a9b96bba3fdb61a6a80217f9a8083ab952a18d6fc26745a2b33b2\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cf3cec6e7dbbb2a911dca2bb53810d7f54ef0420a89bc316a1a3e989aae30646\"" Dec 13 02:25:27.953942 env[1567]: time="2024-12-13T02:25:27.953861870Z" level=info msg="StartContainer for \"cf3cec6e7dbbb2a911dca2bb53810d7f54ef0420a89bc316a1a3e989aae30646\"" Dec 13 02:25:27.962777 systemd[1]: Started cri-containerd-cf3cec6e7dbbb2a911dca2bb53810d7f54ef0420a89bc316a1a3e989aae30646.scope. Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit: BPF prog-id=117 op=LOAD Dec 13 02:25:27.966000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2822 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:27.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366336365633665376462626232613931316463613262623533383130 Dec 13 02:25:27.966000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.966000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2822 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:27.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366336365633665376462626232613931316463613262623533383130 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit: BPF prog-id=118 op=LOAD Dec 13 02:25:27.967000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00026fdc0 items=0 ppid=2822 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:27.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366336365633665376462626232613931316463613262623533383130 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit: BPF prog-id=119 op=LOAD Dec 13 02:25:27.967000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00026fe08 items=0 ppid=2822 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:27.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366336365633665376462626232613931316463613262623533383130 Dec 13 02:25:27.967000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:25:27.967000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:27.967000 audit: BPF prog-id=120 op=LOAD Dec 13 02:25:27.967000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00034a218 items=0 ppid=2822 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:27.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366336365633665376462626232613931316463613262623533383130 Dec 13 02:25:27.973678 env[1567]: time="2024-12-13T02:25:27.973627225Z" level=info msg="StartContainer for \"cf3cec6e7dbbb2a911dca2bb53810d7f54ef0420a89bc316a1a3e989aae30646\" returns successfully" Dec 13 02:25:30.666000 audit[3115]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:30.705437 kernel: kauditd_printk_skb: 369 callbacks suppressed Dec 13 02:25:30.705509 kernel: audit: type=1325 audit(1734056730.666:922): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:30.666000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd4c862c00 a2=0 a3=7ffd4c862bec items=0 ppid=2913 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:30.791288 kubelet[2635]: I1213 02:25:30.791253 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-zs7xs" podStartSLOduration=3.8288568 podStartE2EDuration="6.791241761s" podCreationTimestamp="2024-12-13 02:25:24 +0000 UTC" firstStartedPulling="2024-12-13 02:25:24.98601721 +0000 UTC m=+14.835115543" lastFinishedPulling="2024-12-13 02:25:27.948402168 +0000 UTC m=+17.797500504" observedRunningTime="2024-12-13 02:25:28.266195782 +0000 UTC m=+18.115294186" watchObservedRunningTime="2024-12-13 02:25:30.791241761 +0000 UTC m=+20.640340092" Dec 13 02:25:30.791671 kubelet[2635]: I1213 02:25:30.791333 2635 topology_manager.go:215] "Topology Admit Handler" podUID="5272ef21-0705-48bf-b915-d8886e440b52" podNamespace="calico-system" podName="calico-typha-6745888c7c-jfclh" Dec 13 02:25:30.794335 systemd[1]: Created slice kubepods-besteffort-pod5272ef21_0705_48bf_b915_d8886e440b52.slice. Dec 13 02:25:30.816426 kubelet[2635]: I1213 02:25:30.816392 2635 topology_manager.go:215] "Topology Admit Handler" podUID="6da3f092-b9a4-4bb3-aa01-1e1b4f776987" podNamespace="calico-system" podName="calico-node-t86xl" Dec 13 02:25:30.819490 systemd[1]: Created slice kubepods-besteffort-pod6da3f092_b9a4_4bb3_aa01_1e1b4f776987.slice. Dec 13 02:25:30.861886 kernel: audit: type=1300 audit(1734056730.666:922): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd4c862c00 a2=0 a3=7ffd4c862bec items=0 ppid=2913 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:30.861959 kernel: audit: type=1327 audit(1734056730.666:922): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:30.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:30.860000 audit[3115]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:30.921562 kubelet[2635]: I1213 02:25:30.921513 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5272ef21-0705-48bf-b915-d8886e440b52-tigera-ca-bundle\") pod \"calico-typha-6745888c7c-jfclh\" (UID: \"5272ef21-0705-48bf-b915-d8886e440b52\") " pod="calico-system/calico-typha-6745888c7c-jfclh" Dec 13 02:25:30.921562 kubelet[2635]: I1213 02:25:30.921540 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-flexvol-driver-host\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921562 kubelet[2635]: I1213 02:25:30.921552 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-node-certs\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921562 kubelet[2635]: I1213 02:25:30.921561 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-var-lib-calico\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921666 kubelet[2635]: I1213 02:25:30.921570 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-cni-bin-dir\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921666 kubelet[2635]: I1213 02:25:30.921579 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-tigera-ca-bundle\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921666 kubelet[2635]: I1213 02:25:30.921592 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-var-run-calico\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921666 kubelet[2635]: I1213 02:25:30.921608 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6cmch\" (UniqueName: \"kubernetes.io/projected/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-kube-api-access-6cmch\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921666 kubelet[2635]: I1213 02:25:30.921620 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-cni-net-dir\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921756 kubelet[2635]: I1213 02:25:30.921629 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-policysync\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921756 kubelet[2635]: I1213 02:25:30.921638 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5272ef21-0705-48bf-b915-d8886e440b52-typha-certs\") pod \"calico-typha-6745888c7c-jfclh\" (UID: \"5272ef21-0705-48bf-b915-d8886e440b52\") " pod="calico-system/calico-typha-6745888c7c-jfclh" Dec 13 02:25:30.921756 kubelet[2635]: I1213 02:25:30.921647 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvhpf\" (UniqueName: \"kubernetes.io/projected/5272ef21-0705-48bf-b915-d8886e440b52-kube-api-access-jvhpf\") pod \"calico-typha-6745888c7c-jfclh\" (UID: \"5272ef21-0705-48bf-b915-d8886e440b52\") " pod="calico-system/calico-typha-6745888c7c-jfclh" Dec 13 02:25:30.921756 kubelet[2635]: I1213 02:25:30.921658 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-xtables-lock\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921756 kubelet[2635]: I1213 02:25:30.921669 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-cni-log-dir\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.921854 kubelet[2635]: I1213 02:25:30.921697 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6da3f092-b9a4-4bb3-aa01-1e1b4f776987-lib-modules\") pod \"calico-node-t86xl\" (UID: \"6da3f092-b9a4-4bb3-aa01-1e1b4f776987\") " pod="calico-system/calico-node-t86xl" Dec 13 02:25:30.925523 kubelet[2635]: I1213 02:25:30.925505 2635 topology_manager.go:215] "Topology Admit Handler" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" podNamespace="calico-system" podName="csi-node-driver-9dgt2" Dec 13 02:25:30.925672 kubelet[2635]: E1213 02:25:30.925660 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:30.978738 kernel: audit: type=1325 audit(1734056730.860:923): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:30.978816 kernel: audit: type=1300 audit(1734056730.860:923): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4c862c00 a2=0 a3=0 items=0 ppid=2913 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:30.860000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4c862c00 a2=0 a3=0 items=0 ppid=2913 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.022037 kubelet[2635]: I1213 02:25:31.022021 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a5f62aeb-bf31-464b-83a9-f8b3e9bf766d-varrun\") pod \"csi-node-driver-9dgt2\" (UID: \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\") " pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:31.022092 kubelet[2635]: I1213 02:25:31.022040 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a5f62aeb-bf31-464b-83a9-f8b3e9bf766d-socket-dir\") pod \"csi-node-driver-9dgt2\" (UID: \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\") " pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:31.022116 kubelet[2635]: I1213 02:25:31.022102 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a5f62aeb-bf31-464b-83a9-f8b3e9bf766d-registration-dir\") pod \"csi-node-driver-9dgt2\" (UID: \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\") " pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:31.022150 kubelet[2635]: I1213 02:25:31.022142 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a5f62aeb-bf31-464b-83a9-f8b3e9bf766d-kubelet-dir\") pod \"csi-node-driver-9dgt2\" (UID: \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\") " pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:31.022175 kubelet[2635]: I1213 02:25:31.022159 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tgpx8\" (UniqueName: \"kubernetes.io/projected/a5f62aeb-bf31-464b-83a9-f8b3e9bf766d-kube-api-access-tgpx8\") pod \"csi-node-driver-9dgt2\" (UID: \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\") " pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:31.022630 kubelet[2635]: E1213 02:25:31.022599 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.022676 kubelet[2635]: W1213 02:25:31.022633 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.022762 kubelet[2635]: E1213 02:25:31.022747 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.022894 kubelet[2635]: E1213 02:25:31.022886 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.022894 kubelet[2635]: W1213 02:25:31.022892 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.022958 kubelet[2635]: E1213 02:25:31.022900 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.023039 kubelet[2635]: E1213 02:25:31.023031 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.023039 kubelet[2635]: W1213 02:25:31.023037 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.023101 kubelet[2635]: E1213 02:25:31.023046 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.023175 kubelet[2635]: E1213 02:25:31.023164 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.023175 kubelet[2635]: W1213 02:25:31.023173 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.023239 kubelet[2635]: E1213 02:25:31.023181 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.023273 kubelet[2635]: E1213 02:25:31.023254 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.023273 kubelet[2635]: W1213 02:25:31.023258 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.023273 kubelet[2635]: E1213 02:25:31.023263 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.023364 kubelet[2635]: E1213 02:25:31.023357 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.023364 kubelet[2635]: W1213 02:25:31.023363 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.023430 kubelet[2635]: E1213 02:25:31.023373 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.023950 kubelet[2635]: E1213 02:25:31.023910 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.023950 kubelet[2635]: W1213 02:25:31.023916 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.023950 kubelet[2635]: E1213 02:25:31.023921 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.024308 kubelet[2635]: E1213 02:25:31.024291 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.024335 kubelet[2635]: W1213 02:25:31.024310 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.024356 kubelet[2635]: E1213 02:25:31.024333 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.027162 kubelet[2635]: E1213 02:25:31.027122 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.027162 kubelet[2635]: W1213 02:25:31.027128 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.027162 kubelet[2635]: E1213 02:25:31.027135 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.028497 kubelet[2635]: E1213 02:25:31.028460 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.028497 kubelet[2635]: W1213 02:25:31.028467 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.028497 kubelet[2635]: E1213 02:25:31.028474 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:30.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:31.095584 env[1567]: time="2024-12-13T02:25:31.095565948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6745888c7c-jfclh,Uid:5272ef21-0705-48bf-b915-d8886e440b52,Namespace:calico-system,Attempt:0,}" Dec 13 02:25:31.102421 env[1567]: time="2024-12-13T02:25:31.102390329Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:31.102421 env[1567]: time="2024-12-13T02:25:31.102410591Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:31.102421 env[1567]: time="2024-12-13T02:25:31.102417430Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:31.102531 env[1567]: time="2024-12-13T02:25:31.102477543Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/358a132b79e8e59df1e3f29c549e08ac770dabde26dd01973e7f91970541860b pid=3137 runtime=io.containerd.runc.v2 Dec 13 02:25:31.107872 systemd[1]: Started cri-containerd-358a132b79e8e59df1e3f29c549e08ac770dabde26dd01973e7f91970541860b.scope. Dec 13 02:25:31.120783 env[1567]: time="2024-12-13T02:25:31.120764759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t86xl,Uid:6da3f092-b9a4-4bb3-aa01-1e1b4f776987,Namespace:calico-system,Attempt:0,}" Dec 13 02:25:31.123170 kubelet[2635]: E1213 02:25:31.123160 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123221 kubelet[2635]: W1213 02:25:31.123170 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123221 kubelet[2635]: E1213 02:25:31.123182 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123285 kubelet[2635]: E1213 02:25:31.123280 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123285 kubelet[2635]: W1213 02:25:31.123285 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123333 kubelet[2635]: E1213 02:25:31.123291 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123376 kubelet[2635]: E1213 02:25:31.123369 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123376 kubelet[2635]: W1213 02:25:31.123375 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123429 kubelet[2635]: E1213 02:25:31.123382 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123469 kubelet[2635]: E1213 02:25:31.123463 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123469 kubelet[2635]: W1213 02:25:31.123469 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123515 kubelet[2635]: E1213 02:25:31.123476 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123608 kubelet[2635]: E1213 02:25:31.123603 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123635 kubelet[2635]: W1213 02:25:31.123608 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123635 kubelet[2635]: E1213 02:25:31.123614 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123716 kubelet[2635]: E1213 02:25:31.123711 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123739 kubelet[2635]: W1213 02:25:31.123716 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123739 kubelet[2635]: E1213 02:25:31.123723 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123825 kubelet[2635]: E1213 02:25:31.123820 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123825 kubelet[2635]: W1213 02:25:31.123825 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123872 kubelet[2635]: E1213 02:25:31.123830 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123894 kubelet[2635]: E1213 02:25:31.123891 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.123919 kubelet[2635]: W1213 02:25:31.123895 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.123919 kubelet[2635]: E1213 02:25:31.123899 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.123996 kubelet[2635]: E1213 02:25:31.123989 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124022 kubelet[2635]: W1213 02:25:31.123996 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124022 kubelet[2635]: E1213 02:25:31.124004 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124082 kubelet[2635]: E1213 02:25:31.124078 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124105 kubelet[2635]: W1213 02:25:31.124082 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124105 kubelet[2635]: E1213 02:25:31.124087 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124156 kubelet[2635]: E1213 02:25:31.124152 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124181 kubelet[2635]: W1213 02:25:31.124156 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124181 kubelet[2635]: E1213 02:25:31.124161 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124239 kubelet[2635]: E1213 02:25:31.124235 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124239 kubelet[2635]: W1213 02:25:31.124239 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124282 kubelet[2635]: E1213 02:25:31.124244 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124314 kubelet[2635]: E1213 02:25:31.124309 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124340 kubelet[2635]: W1213 02:25:31.124314 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124340 kubelet[2635]: E1213 02:25:31.124318 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124545 kubelet[2635]: E1213 02:25:31.124531 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124570 kubelet[2635]: W1213 02:25:31.124549 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124593 kubelet[2635]: E1213 02:25:31.124578 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124792 kubelet[2635]: E1213 02:25:31.124777 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.124817 kubelet[2635]: W1213 02:25:31.124795 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.124840 kubelet[2635]: E1213 02:25:31.124820 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.124992 kubelet[2635]: E1213 02:25:31.124980 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125015 kubelet[2635]: W1213 02:25:31.124995 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125039 kubelet[2635]: E1213 02:25:31.125023 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.125200 kubelet[2635]: E1213 02:25:31.125189 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125226 kubelet[2635]: W1213 02:25:31.125203 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125249 kubelet[2635]: E1213 02:25:31.125224 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.125373 kubelet[2635]: E1213 02:25:31.125358 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125398 kubelet[2635]: W1213 02:25:31.125383 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125421 kubelet[2635]: E1213 02:25:31.125399 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.125609 kubelet[2635]: E1213 02:25:31.125594 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125639 kubelet[2635]: W1213 02:25:31.125612 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125664 kubelet[2635]: E1213 02:25:31.125636 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.125748 kubelet[2635]: E1213 02:25:31.125741 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125774 kubelet[2635]: W1213 02:25:31.125749 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125774 kubelet[2635]: E1213 02:25:31.125759 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.125944 kubelet[2635]: E1213 02:25:31.125932 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.125976 kubelet[2635]: W1213 02:25:31.125947 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.125976 kubelet[2635]: E1213 02:25:31.125969 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.126179 kubelet[2635]: E1213 02:25:31.126164 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.126210 kubelet[2635]: W1213 02:25:31.126182 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.126237 kubelet[2635]: E1213 02:25:31.126209 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.126449 kubelet[2635]: E1213 02:25:31.126437 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.126482 kubelet[2635]: W1213 02:25:31.126452 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.126506 kubelet[2635]: E1213 02:25:31.126479 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.126590 kubelet[2635]: E1213 02:25:31.126584 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.126590 kubelet[2635]: W1213 02:25:31.126589 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.126635 kubelet[2635]: E1213 02:25:31.126597 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.126685 kubelet[2635]: E1213 02:25:31.126680 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.126685 kubelet[2635]: W1213 02:25:31.126684 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.126735 kubelet[2635]: E1213 02:25:31.126689 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.127557 env[1567]: time="2024-12-13T02:25:31.127526372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:31.127557 env[1567]: time="2024-12-13T02:25:31.127546626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:31.127557 env[1567]: time="2024-12-13T02:25:31.127553354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:31.127632 env[1567]: time="2024-12-13T02:25:31.127615216Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0 pid=3185 runtime=io.containerd.runc.v2 Dec 13 02:25:31.130105 kubelet[2635]: E1213 02:25:31.130088 2635 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:25:31.130154 kubelet[2635]: W1213 02:25:31.130107 2635 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:25:31.130154 kubelet[2635]: E1213 02:25:31.130129 2635 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:25:31.132932 systemd[1]: Started cri-containerd-394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0.scope. Dec 13 02:25:31.133882 kernel: audit: type=1327 audit(1734056730.860:923): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.269346 kernel: audit: type=1400 audit(1734056731.140:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.269407 kernel: audit: type=1400 audit(1734056731.140:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.269432 kernel: audit: type=1400 audit(1734056731.140:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332961 kernel: audit: type=1400 audit(1734056731.140:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.141000 audit[3225]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:31.141000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff69555900 a2=0 a3=7fff695558ec items=0 ppid=2913 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:31.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit: BPF prog-id=121 op=LOAD Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3185 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346331353639633361626238326436323035343034626661313435 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3185 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346331353639633361626238326436323035343034626661313435 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.331000 audit: BPF prog-id=122 op=LOAD Dec 13 02:25:31.331000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000206590 items=0 ppid=3185 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346331353639633361626238326436323035343034626661313435 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit: BPF prog-id=123 op=LOAD Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit: BPF prog-id=124 op=LOAD Dec 13 02:25:31.395000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0002065d8 items=0 ppid=3185 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346331353639633361626238326436323035343034626661313435 Dec 13 02:25:31.395000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:25:31.395000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.395000 audit: BPF prog-id=125 op=LOAD Dec 13 02:25:31.395000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0002069e8 items=0 ppid=3185 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346331353639633361626238326436323035343034626661313435 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3137 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386131333262373965386535396466316533663239633534396530 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3137 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386131333262373965386535396466316533663239633534396530 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit: BPF prog-id=126 op=LOAD Dec 13 02:25:31.396000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000302850 items=0 ppid=3137 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386131333262373965386535396466316533663239633534396530 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit: BPF prog-id=127 op=LOAD Dec 13 02:25:31.396000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000302898 items=0 ppid=3137 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386131333262373965386535396466316533663239633534396530 Dec 13 02:25:31.396000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:25:31.396000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:31.396000 audit: BPF prog-id=128 op=LOAD Dec 13 02:25:31.396000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000302ca8 items=0 ppid=3137 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386131333262373965386535396466316533663239633534396530 Dec 13 02:25:31.401650 env[1567]: time="2024-12-13T02:25:31.401622734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t86xl,Uid:6da3f092-b9a4-4bb3-aa01-1e1b4f776987,Namespace:calico-system,Attempt:0,} returns sandbox id \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\"" Dec 13 02:25:31.402328 env[1567]: time="2024-12-13T02:25:31.402314716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:25:31.402000 audit[3225]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:31.402000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff69555900 a2=0 a3=0 items=0 ppid=2913 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:31.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:31.413568 env[1567]: time="2024-12-13T02:25:31.413513973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6745888c7c-jfclh,Uid:5272ef21-0705-48bf-b915-d8886e440b52,Namespace:calico-system,Attempt:0,} returns sandbox id \"358a132b79e8e59df1e3f29c549e08ac770dabde26dd01973e7f91970541860b\"" Dec 13 02:25:32.652784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount508412673.mount: Deactivated successfully. Dec 13 02:25:32.734999 env[1567]: time="2024-12-13T02:25:32.734944580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:32.735549 env[1567]: time="2024-12-13T02:25:32.735512420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:32.736106 env[1567]: time="2024-12-13T02:25:32.736064742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:32.737192 env[1567]: time="2024-12-13T02:25:32.737143643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:32.737360 env[1567]: time="2024-12-13T02:25:32.737347179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:25:32.737916 env[1567]: time="2024-12-13T02:25:32.737870851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:25:32.738377 env[1567]: time="2024-12-13T02:25:32.738358218Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:25:32.743346 env[1567]: time="2024-12-13T02:25:32.743328540Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88\"" Dec 13 02:25:32.743621 env[1567]: time="2024-12-13T02:25:32.743567349Z" level=info msg="StartContainer for \"4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88\"" Dec 13 02:25:32.751213 systemd[1]: Started cri-containerd-4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88.scope. Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fe5e5d60308 items=0 ppid=3185 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:32.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373739643366383665633730306661303130306164356434346466 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit: BPF prog-id=129 op=LOAD Dec 13 02:25:32.757000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000355ba8 items=0 ppid=3185 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:32.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373739643366383665633730306661303130306164356434346466 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit: BPF prog-id=130 op=LOAD Dec 13 02:25:32.757000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000355bf8 items=0 ppid=3185 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:32.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373739643366383665633730306661303130306164356434346466 Dec 13 02:25:32.757000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:25:32.757000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:32.757000 audit: BPF prog-id=131 op=LOAD Dec 13 02:25:32.757000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000355c88 items=0 ppid=3185 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:32.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373739643366383665633730306661303130306164356434346466 Dec 13 02:25:32.764355 env[1567]: time="2024-12-13T02:25:32.764329677Z" level=info msg="StartContainer for \"4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88\" returns successfully" Dec 13 02:25:32.769895 systemd[1]: cri-containerd-4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88.scope: Deactivated successfully. Dec 13 02:25:32.778000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:25:33.000909 env[1567]: time="2024-12-13T02:25:33.000837692Z" level=info msg="shim disconnected" id=4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88 Dec 13 02:25:33.000909 env[1567]: time="2024-12-13T02:25:33.000878466Z" level=warning msg="cleaning up after shim disconnected" id=4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88 namespace=k8s.io Dec 13 02:25:33.000909 env[1567]: time="2024-12-13T02:25:33.000891372Z" level=info msg="cleaning up dead shim" Dec 13 02:25:33.006552 env[1567]: time="2024-12-13T02:25:33.006498193Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3282 runtime=io.containerd.runc.v2\n" Dec 13 02:25:33.029206 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4a779d3f86ec700fa0100ad5d44df2c10ce50ac3be62263f3bef7eb36a194a88-rootfs.mount: Deactivated successfully. Dec 13 02:25:33.202216 kubelet[2635]: E1213 02:25:33.202132 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:34.869848 env[1567]: time="2024-12-13T02:25:34.869791609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:34.870381 env[1567]: time="2024-12-13T02:25:34.870342910Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:34.870965 env[1567]: time="2024-12-13T02:25:34.870926508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:34.871928 env[1567]: time="2024-12-13T02:25:34.871876487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:34.872076 env[1567]: time="2024-12-13T02:25:34.872032365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:25:34.872692 env[1567]: time="2024-12-13T02:25:34.872678146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:25:34.876475 env[1567]: time="2024-12-13T02:25:34.876457923Z" level=info msg="CreateContainer within sandbox \"358a132b79e8e59df1e3f29c549e08ac770dabde26dd01973e7f91970541860b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:25:34.881320 env[1567]: time="2024-12-13T02:25:34.881277035Z" level=info msg="CreateContainer within sandbox \"358a132b79e8e59df1e3f29c549e08ac770dabde26dd01973e7f91970541860b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"169abc1d5dc21bee3bf8b0bed58e810453dd917f969ddda62bfa384256ab833a\"" Dec 13 02:25:34.881592 env[1567]: time="2024-12-13T02:25:34.881576600Z" level=info msg="StartContainer for \"169abc1d5dc21bee3bf8b0bed58e810453dd917f969ddda62bfa384256ab833a\"" Dec 13 02:25:34.892603 systemd[1]: Started cri-containerd-169abc1d5dc21bee3bf8b0bed58e810453dd917f969ddda62bfa384256ab833a.scope. Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit: BPF prog-id=132 op=LOAD Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3137 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:34.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136396162633164356463323162656533626638623062656435386538 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3137 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:34.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136396162633164356463323162656533626638623062656435386538 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit: BPF prog-id=133 op=LOAD Dec 13 02:25:34.897000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d40d0 items=0 ppid=3137 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:34.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136396162633164356463323162656533626638623062656435386538 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit: BPF prog-id=134 op=LOAD Dec 13 02:25:34.897000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d4118 items=0 ppid=3137 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:34.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136396162633164356463323162656533626638623062656435386538 Dec 13 02:25:34.897000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:25:34.897000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:34.897000 audit: BPF prog-id=135 op=LOAD Dec 13 02:25:34.897000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4528 items=0 ppid=3137 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:34.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136396162633164356463323162656533626638623062656435386538 Dec 13 02:25:34.915920 env[1567]: time="2024-12-13T02:25:34.915876808Z" level=info msg="StartContainer for \"169abc1d5dc21bee3bf8b0bed58e810453dd917f969ddda62bfa384256ab833a\" returns successfully" Dec 13 02:25:35.201746 kubelet[2635]: E1213 02:25:35.201505 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:35.275516 kubelet[2635]: I1213 02:25:35.275483 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6745888c7c-jfclh" podStartSLOduration=1.816956304 podStartE2EDuration="5.275471346s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:31.414077625 +0000 UTC m=+21.263175957" lastFinishedPulling="2024-12-13 02:25:34.872592661 +0000 UTC m=+24.721690999" observedRunningTime="2024-12-13 02:25:35.275298365 +0000 UTC m=+25.124396704" watchObservedRunningTime="2024-12-13 02:25:35.275471346 +0000 UTC m=+25.124569678" Dec 13 02:25:36.269518 kubelet[2635]: I1213 02:25:36.269503 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:25:36.746000 audit[3352]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:36.774962 kernel: kauditd_printk_skb: 217 callbacks suppressed Dec 13 02:25:36.775019 kernel: audit: type=1325 audit(1734056736.746:987): table=filter:93 family=2 entries=17 op=nft_register_rule pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:36.746000 audit[3352]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe1a25a700 a2=0 a3=7ffe1a25a6ec items=0 ppid=2913 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:36.931716 kernel: audit: type=1300 audit(1734056736.746:987): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe1a25a700 a2=0 a3=7ffe1a25a6ec items=0 ppid=2913 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:36.931781 kernel: audit: type=1327 audit(1734056736.746:987): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:36.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:36.990000 audit[3352]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:36.990000 audit[3352]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1a25a700 a2=0 a3=7ffe1a25a6ec items=0 ppid=2913 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:37.148771 kernel: audit: type=1325 audit(1734056736.990:988): table=nat:94 family=2 entries=19 op=nft_register_chain pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:37.148836 kernel: audit: type=1300 audit(1734056736.990:988): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1a25a700 a2=0 a3=7ffe1a25a6ec items=0 ppid=2913 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:37.148858 kernel: audit: type=1327 audit(1734056736.990:988): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:36.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:37.201575 kubelet[2635]: E1213 02:25:37.201528 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:38.048315 env[1567]: time="2024-12-13T02:25:38.048262378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:38.048972 env[1567]: time="2024-12-13T02:25:38.048933805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:38.049680 env[1567]: time="2024-12-13T02:25:38.049639539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:38.050351 env[1567]: time="2024-12-13T02:25:38.050310826Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:38.050734 env[1567]: time="2024-12-13T02:25:38.050683211Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:25:38.052319 env[1567]: time="2024-12-13T02:25:38.052280756Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:25:38.058517 env[1567]: time="2024-12-13T02:25:38.058470599Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d\"" Dec 13 02:25:38.058900 env[1567]: time="2024-12-13T02:25:38.058842679Z" level=info msg="StartContainer for \"21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d\"" Dec 13 02:25:38.069002 systemd[1]: Started cri-containerd-21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d.scope. Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcf32e2cba8 items=0 ppid=3185 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:38.238255 kernel: audit: type=1400 audit(1734056738.074:989): avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.238297 kernel: audit: type=1300 audit(1734056738.074:989): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcf32e2cba8 items=0 ppid=3185 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:38.238316 kernel: audit: type=1327 audit(1734056738.074:989): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653936633231633262363766326632643538636234303238373132 Dec 13 02:25:38.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653936633231633262363766326632643538636234303238373132 Dec 13 02:25:38.331658 kernel: audit: type=1400 audit(1734056738.074:990): avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.074000 audit: BPF prog-id=136 op=LOAD Dec 13 02:25:38.074000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fff68 items=0 ppid=3185 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:38.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653936633231633262363766326632643538636234303238373132 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.330000 audit: BPF prog-id=137 op=LOAD Dec 13 02:25:38.330000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fffb8 items=0 ppid=3185 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:38.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653936633231633262363766326632643538636234303238373132 Dec 13 02:25:38.394000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:25:38.394000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:38.394000 audit: BPF prog-id=138 op=LOAD Dec 13 02:25:38.394000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003cc048 items=0 ppid=3185 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:38.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653936633231633262363766326632643538636234303238373132 Dec 13 02:25:38.401141 env[1567]: time="2024-12-13T02:25:38.401090512Z" level=info msg="StartContainer for \"21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d\" returns successfully" Dec 13 02:25:39.181970 env[1567]: time="2024-12-13T02:25:39.181854698Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:25:39.185517 systemd[1]: cri-containerd-21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d.scope: Deactivated successfully. Dec 13 02:25:39.186022 systemd[1]: cri-containerd-21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d.scope: Consumed 1.202s CPU time. Dec 13 02:25:39.202034 kubelet[2635]: E1213 02:25:39.201928 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:39.201000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:25:39.227835 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d-rootfs.mount: Deactivated successfully. Dec 13 02:25:39.232942 kubelet[2635]: I1213 02:25:39.232847 2635 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:25:39.265833 kubelet[2635]: I1213 02:25:39.265765 2635 topology_manager.go:215] "Topology Admit Handler" podUID="77c27cf1-df4b-45e4-8b70-bcac642c213e" podNamespace="kube-system" podName="coredns-7db6d8ff4d-grddm" Dec 13 02:25:39.267768 kubelet[2635]: I1213 02:25:39.267688 2635 topology_manager.go:215] "Topology Admit Handler" podUID="51eb8ded-d184-4bf5-b4cf-a82044b2bc49" podNamespace="calico-apiserver" podName="calico-apiserver-55596fbc64-5pkdn" Dec 13 02:25:39.268928 kubelet[2635]: I1213 02:25:39.268855 2635 topology_manager.go:215] "Topology Admit Handler" podUID="1a03e996-2637-4eb5-a94f-aedd3079d265" podNamespace="calico-apiserver" podName="calico-apiserver-55596fbc64-wvbqt" Dec 13 02:25:39.270115 kubelet[2635]: I1213 02:25:39.270038 2635 topology_manager.go:215] "Topology Admit Handler" podUID="d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82" podNamespace="kube-system" podName="coredns-7db6d8ff4d-qsgq5" Dec 13 02:25:39.271813 kubelet[2635]: I1213 02:25:39.271750 2635 topology_manager.go:215] "Topology Admit Handler" podUID="e138edf7-6d14-4356-a916-344073dbb011" podNamespace="calico-system" podName="calico-kube-controllers-5fd99f6b77-q97mf" Dec 13 02:25:39.280631 systemd[1]: Created slice kubepods-burstable-pod77c27cf1_df4b_45e4_8b70_bcac642c213e.slice. Dec 13 02:25:39.295469 systemd[1]: Created slice kubepods-besteffort-pod51eb8ded_d184_4bf5_b4cf_a82044b2bc49.slice. Dec 13 02:25:39.302412 systemd[1]: Created slice kubepods-besteffort-pod1a03e996_2637_4eb5_a94f_aedd3079d265.slice. Dec 13 02:25:39.308121 systemd[1]: Created slice kubepods-burstable-podd7132bcf_c5eb_44b5_b16e_1a8dd28e3d82.slice. Dec 13 02:25:39.312674 systemd[1]: Created slice kubepods-besteffort-pode138edf7_6d14_4356_a916_344073dbb011.slice. Dec 13 02:25:39.381205 kubelet[2635]: I1213 02:25:39.381103 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1a03e996-2637-4eb5-a94f-aedd3079d265-calico-apiserver-certs\") pod \"calico-apiserver-55596fbc64-wvbqt\" (UID: \"1a03e996-2637-4eb5-a94f-aedd3079d265\") " pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" Dec 13 02:25:39.381205 kubelet[2635]: I1213 02:25:39.381188 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxt5g\" (UniqueName: \"kubernetes.io/projected/e138edf7-6d14-4356-a916-344073dbb011-kube-api-access-kxt5g\") pod \"calico-kube-controllers-5fd99f6b77-q97mf\" (UID: \"e138edf7-6d14-4356-a916-344073dbb011\") " pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" Dec 13 02:25:39.381911 kubelet[2635]: I1213 02:25:39.381256 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-77wxg\" (UniqueName: \"kubernetes.io/projected/d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82-kube-api-access-77wxg\") pod \"coredns-7db6d8ff4d-qsgq5\" (UID: \"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82\") " pod="kube-system/coredns-7db6d8ff4d-qsgq5" Dec 13 02:25:39.381911 kubelet[2635]: I1213 02:25:39.381312 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/51eb8ded-d184-4bf5-b4cf-a82044b2bc49-calico-apiserver-certs\") pod \"calico-apiserver-55596fbc64-5pkdn\" (UID: \"51eb8ded-d184-4bf5-b4cf-a82044b2bc49\") " pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" Dec 13 02:25:39.381911 kubelet[2635]: I1213 02:25:39.381399 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jzg7m\" (UniqueName: \"kubernetes.io/projected/51eb8ded-d184-4bf5-b4cf-a82044b2bc49-kube-api-access-jzg7m\") pod \"calico-apiserver-55596fbc64-5pkdn\" (UID: \"51eb8ded-d184-4bf5-b4cf-a82044b2bc49\") " pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" Dec 13 02:25:39.381911 kubelet[2635]: I1213 02:25:39.381472 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82-config-volume\") pod \"coredns-7db6d8ff4d-qsgq5\" (UID: \"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82\") " pod="kube-system/coredns-7db6d8ff4d-qsgq5" Dec 13 02:25:39.381911 kubelet[2635]: I1213 02:25:39.381523 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e138edf7-6d14-4356-a916-344073dbb011-tigera-ca-bundle\") pod \"calico-kube-controllers-5fd99f6b77-q97mf\" (UID: \"e138edf7-6d14-4356-a916-344073dbb011\") " pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" Dec 13 02:25:39.382450 kubelet[2635]: I1213 02:25:39.381574 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nqgwx\" (UniqueName: \"kubernetes.io/projected/77c27cf1-df4b-45e4-8b70-bcac642c213e-kube-api-access-nqgwx\") pod \"coredns-7db6d8ff4d-grddm\" (UID: \"77c27cf1-df4b-45e4-8b70-bcac642c213e\") " pod="kube-system/coredns-7db6d8ff4d-grddm" Dec 13 02:25:39.382450 kubelet[2635]: I1213 02:25:39.381621 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/77c27cf1-df4b-45e4-8b70-bcac642c213e-config-volume\") pod \"coredns-7db6d8ff4d-grddm\" (UID: \"77c27cf1-df4b-45e4-8b70-bcac642c213e\") " pod="kube-system/coredns-7db6d8ff4d-grddm" Dec 13 02:25:39.382450 kubelet[2635]: I1213 02:25:39.381674 2635 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8kzjk\" (UniqueName: \"kubernetes.io/projected/1a03e996-2637-4eb5-a94f-aedd3079d265-kube-api-access-8kzjk\") pod \"calico-apiserver-55596fbc64-wvbqt\" (UID: \"1a03e996-2637-4eb5-a94f-aedd3079d265\") " pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" Dec 13 02:25:39.587327 env[1567]: time="2024-12-13T02:25:39.587249036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-grddm,Uid:77c27cf1-df4b-45e4-8b70-bcac642c213e,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:39.600069 env[1567]: time="2024-12-13T02:25:39.599960925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-5pkdn,Uid:51eb8ded-d184-4bf5-b4cf-a82044b2bc49,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:25:39.606188 env[1567]: time="2024-12-13T02:25:39.606096067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-wvbqt,Uid:1a03e996-2637-4eb5-a94f-aedd3079d265,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:25:39.611515 env[1567]: time="2024-12-13T02:25:39.611399891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qsgq5,Uid:d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82,Namespace:kube-system,Attempt:0,}" Dec 13 02:25:39.615604 env[1567]: time="2024-12-13T02:25:39.615497911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fd99f6b77-q97mf,Uid:e138edf7-6d14-4356-a916-344073dbb011,Namespace:calico-system,Attempt:0,}" Dec 13 02:25:39.829550 env[1567]: time="2024-12-13T02:25:39.829361183Z" level=info msg="shim disconnected" id=21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d Dec 13 02:25:39.829550 env[1567]: time="2024-12-13T02:25:39.829516180Z" level=warning msg="cleaning up after shim disconnected" id=21e96c21c2b67f2f2d58cb4028712c8814f5f0c19c7e3ca2666af779996c603d namespace=k8s.io Dec 13 02:25:39.829550 env[1567]: time="2024-12-13T02:25:39.829545498Z" level=info msg="cleaning up dead shim" Dec 13 02:25:39.847421 env[1567]: time="2024-12-13T02:25:39.847021458Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3419 runtime=io.containerd.runc.v2\n" Dec 13 02:25:39.904879 env[1567]: time="2024-12-13T02:25:39.904820819Z" level=error msg="Failed to destroy network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.904991 env[1567]: time="2024-12-13T02:25:39.904871065Z" level=error msg="Failed to destroy network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.904991 env[1567]: time="2024-12-13T02:25:39.904953436Z" level=error msg="Failed to destroy network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905119 env[1567]: time="2024-12-13T02:25:39.905100818Z" level=error msg="encountered an error cleaning up failed sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905147 env[1567]: time="2024-12-13T02:25:39.905112233Z" level=error msg="encountered an error cleaning up failed sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905147 env[1567]: time="2024-12-13T02:25:39.905134893Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fd99f6b77-q97mf,Uid:e138edf7-6d14-4356-a916-344073dbb011,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905233 env[1567]: time="2024-12-13T02:25:39.905149291Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qsgq5,Uid:d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905283 env[1567]: time="2024-12-13T02:25:39.905261407Z" level=error msg="encountered an error cleaning up failed sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905335 env[1567]: time="2024-12-13T02:25:39.905288451Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-wvbqt,Uid:1a03e996-2637-4eb5-a94f-aedd3079d265,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905389 kubelet[2635]: E1213 02:25:39.905303 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905389 kubelet[2635]: E1213 02:25:39.905354 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-qsgq5" Dec 13 02:25:39.905389 kubelet[2635]: E1213 02:25:39.905357 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905389 kubelet[2635]: E1213 02:25:39.905375 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-qsgq5" Dec 13 02:25:39.905494 kubelet[2635]: E1213 02:25:39.905384 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" Dec 13 02:25:39.905494 kubelet[2635]: E1213 02:25:39.905398 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" Dec 13 02:25:39.905494 kubelet[2635]: E1213 02:25:39.905404 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-qsgq5_kube-system(d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-qsgq5_kube-system(d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-qsgq5" podUID="d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82" Dec 13 02:25:39.905578 kubelet[2635]: E1213 02:25:39.905418 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55596fbc64-wvbqt_calico-apiserver(1a03e996-2637-4eb5-a94f-aedd3079d265)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55596fbc64-wvbqt_calico-apiserver(1a03e996-2637-4eb5-a94f-aedd3079d265)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" podUID="1a03e996-2637-4eb5-a94f-aedd3079d265" Dec 13 02:25:39.905578 kubelet[2635]: E1213 02:25:39.905303 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905578 kubelet[2635]: E1213 02:25:39.905454 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" Dec 13 02:25:39.905677 kubelet[2635]: E1213 02:25:39.905473 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" Dec 13 02:25:39.905677 kubelet[2635]: E1213 02:25:39.905503 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5fd99f6b77-q97mf_calico-system(e138edf7-6d14-4356-a916-344073dbb011)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5fd99f6b77-q97mf_calico-system(e138edf7-6d14-4356-a916-344073dbb011)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" podUID="e138edf7-6d14-4356-a916-344073dbb011" Dec 13 02:25:39.905740 env[1567]: time="2024-12-13T02:25:39.905707579Z" level=error msg="Failed to destroy network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905740 env[1567]: time="2024-12-13T02:25:39.905710505Z" level=error msg="Failed to destroy network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905879 env[1567]: time="2024-12-13T02:25:39.905863773Z" level=error msg="encountered an error cleaning up failed sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905901 env[1567]: time="2024-12-13T02:25:39.905872827Z" level=error msg="encountered an error cleaning up failed sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905901 env[1567]: time="2024-12-13T02:25:39.905887699Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-grddm,Uid:77c27cf1-df4b-45e4-8b70-bcac642c213e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905948 env[1567]: time="2024-12-13T02:25:39.905895719Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-5pkdn,Uid:51eb8ded-d184-4bf5-b4cf-a82044b2bc49,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905998 kubelet[2635]: E1213 02:25:39.905960 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.905998 kubelet[2635]: E1213 02:25:39.905981 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" Dec 13 02:25:39.905998 kubelet[2635]: E1213 02:25:39.905992 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" Dec 13 02:25:39.906060 kubelet[2635]: E1213 02:25:39.905958 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:39.906060 kubelet[2635]: E1213 02:25:39.906008 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55596fbc64-5pkdn_calico-apiserver(51eb8ded-d184-4bf5-b4cf-a82044b2bc49)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55596fbc64-5pkdn_calico-apiserver(51eb8ded-d184-4bf5-b4cf-a82044b2bc49)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" podUID="51eb8ded-d184-4bf5-b4cf-a82044b2bc49" Dec 13 02:25:39.906060 kubelet[2635]: E1213 02:25:39.906018 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-grddm" Dec 13 02:25:39.906203 kubelet[2635]: E1213 02:25:39.906031 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-grddm" Dec 13 02:25:39.906203 kubelet[2635]: E1213 02:25:39.906048 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-grddm_kube-system(77c27cf1-df4b-45e4-8b70-bcac642c213e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-grddm_kube-system(77c27cf1-df4b-45e4-8b70-bcac642c213e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-grddm" podUID="77c27cf1-df4b-45e4-8b70-bcac642c213e" Dec 13 02:25:40.225990 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25-shm.mount: Deactivated successfully. Dec 13 02:25:40.226249 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81-shm.mount: Deactivated successfully. Dec 13 02:25:40.226464 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a-shm.mount: Deactivated successfully. Dec 13 02:25:40.226633 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e-shm.mount: Deactivated successfully. Dec 13 02:25:40.226804 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96-shm.mount: Deactivated successfully. Dec 13 02:25:40.281860 kubelet[2635]: I1213 02:25:40.281803 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:40.283331 env[1567]: time="2024-12-13T02:25:40.283261833Z" level=info msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" Dec 13 02:25:40.284056 kubelet[2635]: I1213 02:25:40.284016 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:40.285219 env[1567]: time="2024-12-13T02:25:40.285152372Z" level=info msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" Dec 13 02:25:40.290947 env[1567]: time="2024-12-13T02:25:40.290852737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:25:40.291256 kubelet[2635]: I1213 02:25:40.290936 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:40.292289 env[1567]: time="2024-12-13T02:25:40.292195748Z" level=info msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" Dec 13 02:25:40.293644 kubelet[2635]: I1213 02:25:40.293591 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:40.294798 env[1567]: time="2024-12-13T02:25:40.294711090Z" level=info msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" Dec 13 02:25:40.296561 kubelet[2635]: I1213 02:25:40.296505 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:40.297992 env[1567]: time="2024-12-13T02:25:40.297879129Z" level=info msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" Dec 13 02:25:40.329169 env[1567]: time="2024-12-13T02:25:40.329120691Z" level=error msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" failed" error="failed to destroy network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:40.329395 kubelet[2635]: E1213 02:25:40.329340 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:40.329472 kubelet[2635]: E1213 02:25:40.329419 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a"} Dec 13 02:25:40.329511 kubelet[2635]: E1213 02:25:40.329476 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51eb8ded-d184-4bf5-b4cf-a82044b2bc49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:40.329511 kubelet[2635]: E1213 02:25:40.329497 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51eb8ded-d184-4bf5-b4cf-a82044b2bc49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" podUID="51eb8ded-d184-4bf5-b4cf-a82044b2bc49" Dec 13 02:25:40.329719 env[1567]: time="2024-12-13T02:25:40.329687781Z" level=error msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" failed" error="failed to destroy network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:40.329861 kubelet[2635]: E1213 02:25:40.329834 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:40.329915 kubelet[2635]: E1213 02:25:40.329871 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96"} Dec 13 02:25:40.329947 kubelet[2635]: E1213 02:25:40.329908 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:40.330000 kubelet[2635]: E1213 02:25:40.329936 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-qsgq5" podUID="d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82" Dec 13 02:25:40.330759 env[1567]: time="2024-12-13T02:25:40.330727536Z" level=error msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" failed" error="failed to destroy network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:40.330910 kubelet[2635]: E1213 02:25:40.330865 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:40.330910 kubelet[2635]: E1213 02:25:40.330889 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e"} Dec 13 02:25:40.330978 kubelet[2635]: E1213 02:25:40.330916 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77c27cf1-df4b-45e4-8b70-bcac642c213e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:40.330978 kubelet[2635]: E1213 02:25:40.330936 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77c27cf1-df4b-45e4-8b70-bcac642c213e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-grddm" podUID="77c27cf1-df4b-45e4-8b70-bcac642c213e" Dec 13 02:25:40.331282 env[1567]: time="2024-12-13T02:25:40.331255295Z" level=error msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" failed" error="failed to destroy network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:40.331379 kubelet[2635]: E1213 02:25:40.331354 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:40.331419 kubelet[2635]: E1213 02:25:40.331385 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25"} Dec 13 02:25:40.331419 kubelet[2635]: E1213 02:25:40.331407 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e138edf7-6d14-4356-a916-344073dbb011\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:40.331505 kubelet[2635]: E1213 02:25:40.331421 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e138edf7-6d14-4356-a916-344073dbb011\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" podUID="e138edf7-6d14-4356-a916-344073dbb011" Dec 13 02:25:40.334026 env[1567]: time="2024-12-13T02:25:40.333976479Z" level=error msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" failed" error="failed to destroy network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:40.334144 kubelet[2635]: E1213 02:25:40.334121 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:40.334181 kubelet[2635]: E1213 02:25:40.334152 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81"} Dec 13 02:25:40.334181 kubelet[2635]: E1213 02:25:40.334174 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1a03e996-2637-4eb5-a94f-aedd3079d265\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:40.334261 kubelet[2635]: E1213 02:25:40.334190 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1a03e996-2637-4eb5-a94f-aedd3079d265\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" podUID="1a03e996-2637-4eb5-a94f-aedd3079d265" Dec 13 02:25:41.214151 systemd[1]: Created slice kubepods-besteffort-poda5f62aeb_bf31_464b_83a9_f8b3e9bf766d.slice. Dec 13 02:25:41.215312 env[1567]: time="2024-12-13T02:25:41.215293992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9dgt2,Uid:a5f62aeb-bf31-464b-83a9-f8b3e9bf766d,Namespace:calico-system,Attempt:0,}" Dec 13 02:25:41.244085 env[1567]: time="2024-12-13T02:25:41.244041193Z" level=error msg="Failed to destroy network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:41.244272 env[1567]: time="2024-12-13T02:25:41.244255387Z" level=error msg="encountered an error cleaning up failed sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:41.244301 env[1567]: time="2024-12-13T02:25:41.244287514Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9dgt2,Uid:a5f62aeb-bf31-464b-83a9-f8b3e9bf766d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:41.244500 kubelet[2635]: E1213 02:25:41.244439 2635 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:41.244500 kubelet[2635]: E1213 02:25:41.244483 2635 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:41.244500 kubelet[2635]: E1213 02:25:41.244497 2635 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9dgt2" Dec 13 02:25:41.244602 kubelet[2635]: E1213 02:25:41.244526 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9dgt2_calico-system(a5f62aeb-bf31-464b-83a9-f8b3e9bf766d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9dgt2_calico-system(a5f62aeb-bf31-464b-83a9-f8b3e9bf766d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:41.245710 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282-shm.mount: Deactivated successfully. Dec 13 02:25:41.301636 kubelet[2635]: I1213 02:25:41.301561 2635 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:41.302909 env[1567]: time="2024-12-13T02:25:41.302785580Z" level=info msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" Dec 13 02:25:41.355219 env[1567]: time="2024-12-13T02:25:41.355156481Z" level=error msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" failed" error="failed to destroy network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:25:41.355495 kubelet[2635]: E1213 02:25:41.355422 2635 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:41.355495 kubelet[2635]: E1213 02:25:41.355481 2635 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282"} Dec 13 02:25:41.355640 kubelet[2635]: E1213 02:25:41.355523 2635 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:25:41.355640 kubelet[2635]: E1213 02:25:41.355549 2635 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9dgt2" podUID="a5f62aeb-bf31-464b-83a9-f8b3e9bf766d" Dec 13 02:25:44.621131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount964215938.mount: Deactivated successfully. Dec 13 02:25:44.641927 env[1567]: time="2024-12-13T02:25:44.641905889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:44.642470 env[1567]: time="2024-12-13T02:25:44.642458692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:44.643018 env[1567]: time="2024-12-13T02:25:44.643007341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:44.643953 env[1567]: time="2024-12-13T02:25:44.643942208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:44.644095 env[1567]: time="2024-12-13T02:25:44.644082122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:25:44.648472 env[1567]: time="2024-12-13T02:25:44.648427385Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:25:44.653761 env[1567]: time="2024-12-13T02:25:44.653743170Z" level=info msg="CreateContainer within sandbox \"394c1569c3abb82d6205404bfa14591cff2facce17302cfc43af83a356f0f8b0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"20055ba8b925edac060e59f3d23db4035a2c71277cddb370af597c800a4d5b42\"" Dec 13 02:25:44.654008 env[1567]: time="2024-12-13T02:25:44.653995251Z" level=info msg="StartContainer for \"20055ba8b925edac060e59f3d23db4035a2c71277cddb370af597c800a4d5b42\"" Dec 13 02:25:44.662245 systemd[1]: Started cri-containerd-20055ba8b925edac060e59f3d23db4035a2c71277cddb370af597c800a4d5b42.scope. Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.697748 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 02:25:44.697799 kernel: audit: type=1400 audit(1734056744.669:996): avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5c92c0e2b8 items=0 ppid=3185 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:44.763372 kernel: audit: type=1300 audit(1734056744.669:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5c92c0e2b8 items=0 ppid=3185 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:44.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303535626138623932356564616330363065353966336432336462 Dec 13 02:25:44.954107 kernel: audit: type=1327 audit(1734056744.669:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303535626138623932356564616330363065353966336432336462 Dec 13 02:25:44.954139 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.017707 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.081278 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.081303 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.214261 env[1567]: time="2024-12-13T02:25:45.214242036Z" level=info msg="StartContainer for \"20055ba8b925edac060e59f3d23db4035a2c71277cddb370af597c800a4d5b42\" returns successfully" Dec 13 02:25:45.272866 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.272922 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:45.316513 kubelet[2635]: I1213 02:25:45.316482 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-t86xl" podStartSLOduration=2.074112738 podStartE2EDuration="15.31647227s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:31.402194194 +0000 UTC m=+21.251292527" lastFinishedPulling="2024-12-13 02:25:44.644553724 +0000 UTC m=+34.493652059" observedRunningTime="2024-12-13 02:25:45.316115909 +0000 UTC m=+35.165214244" watchObservedRunningTime="2024-12-13 02:25:45.31647227 +0000 UTC m=+35.165570608" Dec 13 02:25:45.336863 kernel: audit: type=1400 audit(1734056744.669:997): avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.669000 audit: BPF prog-id=139 op=LOAD Dec 13 02:25:44.669000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002c3c88 items=0 ppid=3185 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:44.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303535626138623932356564616330363065353966336432336462 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.761000 audit: BPF prog-id=140 op=LOAD Dec 13 02:25:44.761000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0002c3cd8 items=0 ppid=3185 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:44.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303535626138623932356564616330363065353966336432336462 Dec 13 02:25:44.952000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:25:44.952000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:44.952000 audit: BPF prog-id=141 op=LOAD Dec 13 02:25:44.952000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002c3d68 items=0 ppid=3185 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:44.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230303535626138623932356564616330363065353966336432336462 Dec 13 02:25:45.486259 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:25:45.486320 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:25:46.310877 kubelet[2635]: I1213 02:25:46.310818 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:25:46.751000 audit[4046]: AVC avc: denied { write } for pid=4046 comm="tee" name="fd" dev="proc" ino=39981 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4046]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdaa781a0c a2=241 a3=1b6 items=1 ppid=4007 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=39978 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.751000 audit[4039]: AVC avc: denied { write } for pid=4039 comm="tee" name="fd" dev="proc" ino=37034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4039]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4f3b9a0d a2=241 a3=1b6 items=1 ppid=4002 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=34331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.751000 audit[4048]: AVC avc: denied { write } for pid=4048 comm="tee" name="fd" dev="proc" ino=32658 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4048]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd59097a0e a2=241 a3=1b6 items=1 ppid=4001 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=32655 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.751000 audit[4040]: AVC avc: denied { write } for pid=4040 comm="tee" name="fd" dev="proc" ino=35044 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4040]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe47258a0c a2=241 a3=1b6 items=1 ppid=4004 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=14305 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.751000 audit[4041]: AVC avc: denied { write } for pid=4041 comm="tee" name="fd" dev="proc" ino=14308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4041]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc48ce9fd a2=241 a3=1b6 items=1 ppid=4005 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=30561 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.751000 audit[4043]: AVC avc: denied { write } for pid=4043 comm="tee" name="fd" dev="proc" ino=40975 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.751000 audit[4043]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde3d3aa0c a2=241 a3=1b6 items=1 ppid=4008 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.751000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:25:46.751000 audit: PATH item=0 name="/dev/fd/63" inode=40972 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.752000 audit[4047]: AVC avc: denied { write } for pid=4047 comm="tee" name="fd" dev="proc" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:25:46.752000 audit[4047]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff250829fc a2=241 a3=1b6 items=1 ppid=4006 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.752000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:25:46.752000 audit: PATH item=0 name="/dev/fd/63" inode=37031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:25:46.752000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit: BPF prog-id=142 op=LOAD Dec 13 02:25:46.798000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0f230b80 a2=98 a3=3 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.798000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit: BPF prog-id=143 op=LOAD Dec 13 02:25:46.798000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f230960 a2=74 a3=540051 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.798000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.798000 audit: BPF prog-id=144 op=LOAD Dec 13 02:25:46.798000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f230990 a2=94 a3=2 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.798000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.877000 audit: BPF prog-id=145 op=LOAD Dec 13 02:25:46.877000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f230850 a2=40 a3=1 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.877000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.878000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:25:46.878000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.878000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0f230920 a2=50 a3=7fff0f230a00 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.878000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f230860 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f230890 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f2307a0 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f2308b0 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f230890 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f230880 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f2308b0 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f230890 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f2308b0 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f230880 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f2308f0 a2=28 a3=0 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0f2306a0 a2=50 a3=1 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit: BPF prog-id=146 op=LOAD Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0f2306a0 a2=94 a3=5 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0f230750 a2=50 a3=1 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff0f230870 a2=4 a3=38 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { confidentiality } for pid=4147 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f2308c0 a2=94 a3=6 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { confidentiality } for pid=4147 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f230070 a2=94 a3=83 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { perfmon } for pid=4147 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { bpf } for pid=4147 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.884000 audit[4147]: AVC avc: denied { confidentiality } for pid=4147 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:46.884000 audit[4147]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f230070 a2=94 a3=83 items=0 ppid=4015 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit: BPF prog-id=147 op=LOAD Dec 13 02:25:46.888000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1c8d0040 a2=98 a3=1999999999999999 items=0 ppid=4015 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.888000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:25:46.888000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit: BPF prog-id=148 op=LOAD Dec 13 02:25:46.888000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1c8cff20 a2=74 a3=ffff items=0 ppid=4015 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.888000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:25:46.888000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.888000 audit: BPF prog-id=149 op=LOAD Dec 13 02:25:46.888000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1c8cff60 a2=40 a3=7ffe1c8d0140 items=0 ppid=4015 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.888000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:25:46.888000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:25:46.910939 systemd-networkd[1303]: vxlan.calico: Link UP Dec 13 02:25:46.910944 systemd-networkd[1303]: vxlan.calico: Gained carrier Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=150 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce70a5fd0 a2=98 a3=ffffffff items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=151 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce70a5de0 a2=74 a3=540051 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=152 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce70a5e10 a2=94 a3=2 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5ce0 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce70a5d10 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce70a5c20 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5d30 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5d10 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5d00 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5d30 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce70a5d10 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce70a5d30 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce70a5d00 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffce70a5d70 a2=28 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=153 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce70a5be0 a2=40 a3=0 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffce70a5bd0 a2=50 a3=2800 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffce70a5bd0 a2=50 a3=2800 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=154 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce70a53f0 a2=94 a3=2 items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.913000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.913000 audit: BPF prog-id=155 op=LOAD Dec 13 02:25:46.913000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce70a54f0 a2=94 a3=2d items=0 ppid=4015 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.914000 audit: BPF prog-id=156 op=LOAD Dec 13 02:25:46.914000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb75236f0 a2=98 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.914000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:46.914000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit: BPF prog-id=157 op=LOAD Dec 13 02:25:46.915000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb75234d0 a2=74 a3=540051 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:46.915000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.915000 audit: BPF prog-id=158 op=LOAD Dec 13 02:25:46.915000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb7523500 a2=94 a3=2 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:46.915000 audit: BPF prog-id=158 op=UNLOAD Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit: BPF prog-id=159 op=LOAD Dec 13 02:25:46.996000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb75233c0 a2=40 a3=1 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:46.996000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:25:46.996000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:46.996000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb7523490 a2=50 a3=7ffeb7523570 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:46.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb75233d0 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7523400 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7523310 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7523420 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7523400 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb75233f0 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7523420 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7523400 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7523420 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb75233f0 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7523460 a2=28 a3=0 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb7523210 a2=50 a3=1 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit: BPF prog-id=160 op=LOAD Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb7523210 a2=94 a3=5 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb75232c0 a2=50 a3=1 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb75233e0 a2=4 a3=38 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7523430 a2=94 a3=6 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7522be0 a2=94 a3=83 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7522be0 a2=94 a3=83 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.003000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.003000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7524620 a2=10 a3=f1f00800 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.004000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.004000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb75244c0 a2=10 a3=3 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.004000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.004000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7524460 a2=10 a3=3 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.004000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:47.004000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7524460 a2=10 a3=7 items=0 ppid=4015 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:25:47.018000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:25:47.047000 audit[4246]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:47.047000 audit[4246]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcc738fa50 a2=0 a3=7ffcc738fa3c items=0 ppid=4015 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:47.050000 audit[4245]: NETFILTER_CFG table=nat:96 family=2 entries=15 op=nft_register_chain pid=4245 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:47.050000 audit[4245]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd0a3fd1c0 a2=0 a3=7ffd0a3fd1ac items=0 ppid=4015 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:47.052000 audit[4249]: NETFILTER_CFG table=filter:97 family=2 entries=39 op=nft_register_chain pid=4249 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:47.052000 audit[4249]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc821ded30 a2=0 a3=7ffc821ded1c items=0 ppid=4015 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:47.053000 audit[4244]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=4244 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:47.053000 audit[4244]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd80eab020 a2=0 a3=7ffd80eab00c items=0 ppid=4015 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:47.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:48.040709 systemd-networkd[1303]: vxlan.calico: Gained IPv6LL Dec 13 02:25:51.203311 env[1567]: time="2024-12-13T02:25:51.203188319Z" level=info msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.236 [INFO][4274] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.236 [INFO][4274] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" iface="eth0" netns="/var/run/netns/cni-9ff1fc42-15e5-2590-fa28-f573f427c46d" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.237 [INFO][4274] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" iface="eth0" netns="/var/run/netns/cni-9ff1fc42-15e5-2590-fa28-f573f427c46d" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.237 [INFO][4274] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" iface="eth0" netns="/var/run/netns/cni-9ff1fc42-15e5-2590-fa28-f573f427c46d" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.237 [INFO][4274] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.237 [INFO][4274] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.248 [INFO][4286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.248 [INFO][4286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.248 [INFO][4286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.253 [WARNING][4286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.253 [INFO][4286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.254 [INFO][4286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:51.256948 env[1567]: 2024-12-13 02:25:51.256 [INFO][4274] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:25:51.257318 env[1567]: time="2024-12-13T02:25:51.257006485Z" level=info msg="TearDown network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" successfully" Dec 13 02:25:51.257318 env[1567]: time="2024-12-13T02:25:51.257031781Z" level=info msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" returns successfully" Dec 13 02:25:51.257485 env[1567]: time="2024-12-13T02:25:51.257469414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-5pkdn,Uid:51eb8ded-d184-4bf5-b4cf-a82044b2bc49,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:25:51.258731 systemd[1]: run-netns-cni\x2d9ff1fc42\x2d15e5\x2d2590\x2dfa28\x2df573f427c46d.mount: Deactivated successfully. Dec 13 02:25:51.358685 systemd-networkd[1303]: cali89d51d63579: Link UP Dec 13 02:25:51.423910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:25:51.423959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali89d51d63579: link becomes ready Dec 13 02:25:51.423896 systemd-networkd[1303]: cali89d51d63579: Gained carrier Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.279 [INFO][4297] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0 calico-apiserver-55596fbc64- calico-apiserver 51eb8ded-d184-4bf5-b4cf-a82044b2bc49 732 0 2024-12-13 02:25:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55596fbc64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e calico-apiserver-55596fbc64-5pkdn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali89d51d63579 [] []}} ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.279 [INFO][4297] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.296 [INFO][4316] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" HandleID="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.302 [INFO][4316] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" HandleID="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000422ac0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"calico-apiserver-55596fbc64-5pkdn", "timestamp":"2024-12-13 02:25:51.296519368 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.303 [INFO][4316] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.303 [INFO][4316] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.303 [INFO][4316] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.304 [INFO][4316] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.309 [INFO][4316] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.319 [INFO][4316] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.323 [INFO][4316] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.328 [INFO][4316] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.328 [INFO][4316] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.332 [INFO][4316] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1 Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.340 [INFO][4316] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.350 [INFO][4316] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.65/26] block=192.168.62.64/26 handle="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.350 [INFO][4316] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.65/26] handle="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.351 [INFO][4316] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:51.430421 env[1567]: 2024-12-13 02:25:51.351 [INFO][4316] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.65/26] IPv6=[] ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" HandleID="k8s-pod-network.fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.355 [INFO][4297] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"51eb8ded-d184-4bf5-b4cf-a82044b2bc49", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"calico-apiserver-55596fbc64-5pkdn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89d51d63579", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.355 [INFO][4297] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.65/32] ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.355 [INFO][4297] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali89d51d63579 ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.423 [INFO][4297] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.424 [INFO][4297] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"51eb8ded-d184-4bf5-b4cf-a82044b2bc49", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1", Pod:"calico-apiserver-55596fbc64-5pkdn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89d51d63579", MAC:"06:5e:13:77:5e:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:51.430887 env[1567]: 2024-12-13 02:25:51.429 [INFO][4297] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-5pkdn" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:25:51.435944 env[1567]: time="2024-12-13T02:25:51.435839546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:51.435944 env[1567]: time="2024-12-13T02:25:51.435860157Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:51.435944 env[1567]: time="2024-12-13T02:25:51.435867074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:51.435000 audit[4353]: NETFILTER_CFG table=filter:99 family=2 entries=40 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:51.436121 env[1567]: time="2024-12-13T02:25:51.435927594Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1 pid=4354 runtime=io.containerd.runc.v2 Dec 13 02:25:51.442598 systemd[1]: Started cri-containerd-fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1.scope. Dec 13 02:25:51.462112 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 02:25:51.462152 kernel: audit: type=1325 audit(1734056751.435:1104): table=filter:99 family=2 entries=40 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:51.435000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffca795fe10 a2=0 a3=7ffca795fdfc items=0 ppid=4015 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.520427 kernel: audit: type=1300 audit(1734056751.435:1104): arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffca795fe10 a2=0 a3=7ffca795fdfc items=0 ppid=4015 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:51.676364 kernel: audit: type=1327 audit(1734056751.435:1104): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:51.676421 kernel: audit: type=1400 audit(1734056751.527:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.800897 kernel: audit: type=1400 audit(1734056751.527:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.800928 kernel: audit: type=1400 audit(1734056751.527:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.863124 kernel: audit: type=1400 audit(1734056751.527:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.925790 kernel: audit: type=1400 audit(1734056751.527:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988494 kernel: audit: type=1400 audit(1734056751.527:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.114305 kernel: audit: type=1400 audit(1734056751.527:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit: BPF prog-id=161 op=LOAD Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646431326639383032376466333234316365636461373538656666 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646431326639383032376466333234316365636461373538656666 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.738000 audit: BPF prog-id=162 op=LOAD Dec 13 02:25:51.738000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ea590 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646431326639383032376466333234316365636461373538656666 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.862000 audit: BPF prog-id=163 op=LOAD Dec 13 02:25:51.862000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea5d8 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646431326639383032376466333234316365636461373538656666 Dec 13 02:25:51.988000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:25:51.988000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:51.988000 audit: BPF prog-id=164 op=LOAD Dec 13 02:25:51.988000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea9e8 items=0 ppid=4354 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:51.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665646431326639383032376466333234316365636461373538656666 Dec 13 02:25:52.130329 env[1567]: time="2024-12-13T02:25:52.130303677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-5pkdn,Uid:51eb8ded-d184-4bf5-b4cf-a82044b2bc49,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1\"" Dec 13 02:25:52.131020 env[1567]: time="2024-12-13T02:25:52.131007289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:25:52.202536 env[1567]: time="2024-12-13T02:25:52.202478663Z" level=info msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" iface="eth0" netns="/var/run/netns/cni-e9734109-c769-49b3-d8cf-5a0365edb358" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" iface="eth0" netns="/var/run/netns/cni-e9734109-c769-49b3-d8cf-5a0365edb358" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" iface="eth0" netns="/var/run/netns/cni-e9734109-c769-49b3-d8cf-5a0365edb358" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.235 [INFO][4410] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.248 [INFO][4422] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.248 [INFO][4422] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.248 [INFO][4422] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.255 [WARNING][4422] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.255 [INFO][4422] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.258 [INFO][4422] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:52.263021 env[1567]: 2024-12-13 02:25:52.260 [INFO][4410] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:25:52.263471 env[1567]: time="2024-12-13T02:25:52.263046920Z" level=info msg="TearDown network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" successfully" Dec 13 02:25:52.263471 env[1567]: time="2024-12-13T02:25:52.263065616Z" level=info msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" returns successfully" Dec 13 02:25:52.263535 env[1567]: time="2024-12-13T02:25:52.263486215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-grddm,Uid:77c27cf1-df4b-45e4-8b70-bcac642c213e,Namespace:kube-system,Attempt:1,}" Dec 13 02:25:52.264605 systemd[1]: run-netns-cni\x2de9734109\x2dc769\x2d49b3\x2dd8cf\x2d5a0365edb358.mount: Deactivated successfully. Dec 13 02:25:52.326868 systemd-networkd[1303]: cali1584360fd7a: Link UP Dec 13 02:25:52.355381 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1584360fd7a: link becomes ready Dec 13 02:25:52.355597 systemd-networkd[1303]: cali1584360fd7a: Gained carrier Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.283 [INFO][4437] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0 coredns-7db6d8ff4d- kube-system 77c27cf1-df4b-45e4-8b70-bcac642c213e 739 0 2024-12-13 02:25:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e coredns-7db6d8ff4d-grddm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1584360fd7a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.283 [INFO][4437] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.298 [INFO][4460] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" HandleID="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.304 [INFO][4460] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" HandleID="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c7e30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"coredns-7db6d8ff4d-grddm", "timestamp":"2024-12-13 02:25:52.298251907 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.304 [INFO][4460] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.304 [INFO][4460] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.304 [INFO][4460] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.305 [INFO][4460] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.308 [INFO][4460] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.311 [INFO][4460] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.312 [INFO][4460] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.314 [INFO][4460] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.314 [INFO][4460] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.315 [INFO][4460] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17 Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.321 [INFO][4460] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.324 [INFO][4460] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.66/26] block=192.168.62.64/26 handle="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.324 [INFO][4460] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.66/26] handle="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.324 [INFO][4460] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:52.363178 env[1567]: 2024-12-13 02:25:52.324 [INFO][4460] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.66/26] IPv6=[] ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" HandleID="k8s-pod-network.ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.325 [INFO][4437] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"77c27cf1-df4b-45e4-8b70-bcac642c213e", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"coredns-7db6d8ff4d-grddm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1584360fd7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.325 [INFO][4437] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.66/32] ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.325 [INFO][4437] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1584360fd7a ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.355 [INFO][4437] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.355 [INFO][4437] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"77c27cf1-df4b-45e4-8b70-bcac642c213e", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17", Pod:"coredns-7db6d8ff4d-grddm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1584360fd7a", MAC:"ea:e3:57:68:20:96", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:52.363822 env[1567]: 2024-12-13 02:25:52.362 [INFO][4437] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17" Namespace="kube-system" Pod="coredns-7db6d8ff4d-grddm" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:25:52.370428 env[1567]: time="2024-12-13T02:25:52.370329075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:52.370428 env[1567]: time="2024-12-13T02:25:52.370362858Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:52.370000 audit[4493]: NETFILTER_CFG table=filter:100 family=2 entries=38 op=nft_register_chain pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:52.370000 audit[4493]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe54d9c190 a2=0 a3=7ffe54d9c17c items=0 ppid=4015 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.370000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:52.370841 env[1567]: time="2024-12-13T02:25:52.370385439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:52.370841 env[1567]: time="2024-12-13T02:25:52.370548425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17 pid=4494 runtime=io.containerd.runc.v2 Dec 13 02:25:52.378576 systemd[1]: Started cri-containerd-ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17.scope. Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.385000 audit: BPF prog-id=165 op=LOAD Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4494 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393361346435616637653034393531646462333064376633326666 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4494 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393361346435616637653034393531646462333064376633326666 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit: BPF prog-id=166 op=LOAD Dec 13 02:25:52.386000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000241dc0 items=0 ppid=4494 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393361346435616637653034393531646462333064376633326666 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit: BPF prog-id=167 op=LOAD Dec 13 02:25:52.386000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000241e08 items=0 ppid=4494 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393361346435616637653034393531646462333064376633326666 Dec 13 02:25:52.386000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:25:52.386000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.386000 audit: BPF prog-id=168 op=LOAD Dec 13 02:25:52.386000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003b6218 items=0 ppid=4494 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393361346435616637653034393531646462333064376633326666 Dec 13 02:25:52.408419 env[1567]: time="2024-12-13T02:25:52.408391896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-grddm,Uid:77c27cf1-df4b-45e4-8b70-bcac642c213e,Namespace:kube-system,Attempt:1,} returns sandbox id \"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17\"" Dec 13 02:25:52.409845 env[1567]: time="2024-12-13T02:25:52.409826081Z" level=info msg="CreateContainer within sandbox \"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:25:52.414913 env[1567]: time="2024-12-13T02:25:52.414893519Z" level=info msg="CreateContainer within sandbox \"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f39ed7accacb4c46bd825dc4d262c42d0f04876fd72f708f2972b984bacea477\"" Dec 13 02:25:52.415104 env[1567]: time="2024-12-13T02:25:52.415090378Z" level=info msg="StartContainer for \"f39ed7accacb4c46bd825dc4d262c42d0f04876fd72f708f2972b984bacea477\"" Dec 13 02:25:52.424401 systemd[1]: Started cri-containerd-f39ed7accacb4c46bd825dc4d262c42d0f04876fd72f708f2972b984bacea477.scope. Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.431000 audit: BPF prog-id=169 op=LOAD Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4494 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633396564376163636163623463343662643832356463346432363263 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4494 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633396564376163636163623463343662643832356463346432363263 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit: BPF prog-id=170 op=LOAD Dec 13 02:25:52.432000 audit[4534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d6af0 items=0 ppid=4494 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633396564376163636163623463343662643832356463346432363263 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit: BPF prog-id=171 op=LOAD Dec 13 02:25:52.432000 audit[4534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d6b38 items=0 ppid=4494 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633396564376163636163623463343662643832356463346432363263 Dec 13 02:25:52.432000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:25:52.432000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:52.432000 audit: BPF prog-id=172 op=LOAD Dec 13 02:25:52.432000 audit[4534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d6f48 items=0 ppid=4494 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:52.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633396564376163636163623463343662643832356463346432363263 Dec 13 02:25:52.439015 env[1567]: time="2024-12-13T02:25:52.438981606Z" level=info msg="StartContainer for \"f39ed7accacb4c46bd825dc4d262c42d0f04876fd72f708f2972b984bacea477\" returns successfully" Dec 13 02:25:52.776571 systemd-networkd[1303]: cali89d51d63579: Gained IPv6LL Dec 13 02:25:53.354183 kubelet[2635]: I1213 02:25:53.354078 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-grddm" podStartSLOduration=29.354043922 podStartE2EDuration="29.354043922s" podCreationTimestamp="2024-12-13 02:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:53.353086307 +0000 UTC m=+43.202184702" watchObservedRunningTime="2024-12-13 02:25:53.354043922 +0000 UTC m=+43.203142303" Dec 13 02:25:53.374000 audit[4576]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=4576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:53.374000 audit[4576]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff975dc050 a2=0 a3=7fff975dc03c items=0 ppid=2913 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:53.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:53.390000 audit[4576]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:53.390000 audit[4576]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff975dc050 a2=0 a3=0 items=0 ppid=2913 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:53.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:53.424000 audit[4578]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=4578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:53.424000 audit[4578]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde7f91fa0 a2=0 a3=7ffde7f91f8c items=0 ppid=2913 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:53.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:53.443000 audit[4578]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:53.443000 audit[4578]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde7f91fa0 a2=0 a3=7ffde7f91f8c items=0 ppid=2913 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:53.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:53.963294 kubelet[2635]: I1213 02:25:53.963233 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:25:54.201902 env[1567]: time="2024-12-13T02:25:54.201873617Z" level=info msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" Dec 13 02:25:54.202181 env[1567]: time="2024-12-13T02:25:54.201938926Z" level=info msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" Dec 13 02:25:54.202181 env[1567]: time="2024-12-13T02:25:54.201880809Z" level=info msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" iface="eth0" netns="/var/run/netns/cni-cf2453df-093c-7311-0760-0c39f8954da7" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" iface="eth0" netns="/var/run/netns/cni-cf2453df-093c-7311-0760-0c39f8954da7" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" iface="eth0" netns="/var/run/netns/cni-cf2453df-093c-7311-0760-0c39f8954da7" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.226 [INFO][4683] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.237 [INFO][4732] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.237 [INFO][4732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.237 [INFO][4732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.241 [WARNING][4732] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.241 [INFO][4732] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.242 [INFO][4732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.243584 env[1567]: 2024-12-13 02:25:54.242 [INFO][4683] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:25:54.244096 env[1567]: time="2024-12-13T02:25:54.243677155Z" level=info msg="TearDown network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" successfully" Dec 13 02:25:54.244096 env[1567]: time="2024-12-13T02:25:54.243696499Z" level=info msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" returns successfully" Dec 13 02:25:54.244149 env[1567]: time="2024-12-13T02:25:54.244128596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9dgt2,Uid:a5f62aeb-bf31-464b-83a9-f8b3e9bf766d,Namespace:calico-system,Attempt:1,}" Dec 13 02:25:54.245487 systemd[1]: run-netns-cni\x2dcf2453df\x2d093c\x2d7311\x2d0760\x2d0c39f8954da7.mount: Deactivated successfully. Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" iface="eth0" netns="/var/run/netns/cni-076ead38-214b-0f6b-3ce6-b901171c0674" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" iface="eth0" netns="/var/run/netns/cni-076ead38-214b-0f6b-3ce6-b901171c0674" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" iface="eth0" netns="/var/run/netns/cni-076ead38-214b-0f6b-3ce6-b901171c0674" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.227 [INFO][4685] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.238 [INFO][4737] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.238 [INFO][4737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.242 [INFO][4737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.246 [WARNING][4737] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.246 [INFO][4737] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.247 [INFO][4737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.249760 env[1567]: 2024-12-13 02:25:54.249 [INFO][4685] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:25:54.250165 env[1567]: time="2024-12-13T02:25:54.249823281Z" level=info msg="TearDown network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" successfully" Dec 13 02:25:54.250165 env[1567]: time="2024-12-13T02:25:54.249843030Z" level=info msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" returns successfully" Dec 13 02:25:54.250290 env[1567]: time="2024-12-13T02:25:54.250272986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qsgq5,Uid:d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82,Namespace:kube-system,Attempt:1,}" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" iface="eth0" netns="/var/run/netns/cni-a25ec14d-d625-9f5e-650b-c12c4d1b8ae0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" iface="eth0" netns="/var/run/netns/cni-a25ec14d-d625-9f5e-650b-c12c4d1b8ae0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" iface="eth0" netns="/var/run/netns/cni-a25ec14d-d625-9f5e-650b-c12c4d1b8ae0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.228 [INFO][4684] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.238 [INFO][4738] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.238 [INFO][4738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.248 [INFO][4738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.252 [WARNING][4738] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.252 [INFO][4738] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.253 [INFO][4738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.255824 env[1567]: 2024-12-13 02:25:54.254 [INFO][4684] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:25:54.256141 env[1567]: time="2024-12-13T02:25:54.255882056Z" level=info msg="TearDown network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" successfully" Dec 13 02:25:54.256141 env[1567]: time="2024-12-13T02:25:54.255901905Z" level=info msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" returns successfully" Dec 13 02:25:54.256264 env[1567]: time="2024-12-13T02:25:54.256248441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-wvbqt,Uid:1a03e996-2637-4eb5-a94f-aedd3079d265,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:25:54.260706 systemd[1]: run-netns-cni\x2da25ec14d\x2dd625\x2d9f5e\x2d650b\x2dc12c4d1b8ae0.mount: Deactivated successfully. Dec 13 02:25:54.260761 systemd[1]: run-netns-cni\x2d076ead38\x2d214b\x2d0f6b\x2d3ce6\x2db901171c0674.mount: Deactivated successfully. Dec 13 02:25:54.312468 systemd-networkd[1303]: cali1584360fd7a: Gained IPv6LL Dec 13 02:25:54.314060 systemd-networkd[1303]: calide3e8821d8b: Link UP Dec 13 02:25:54.368832 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:25:54.368907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide3e8821d8b: link becomes ready Dec 13 02:25:54.369192 systemd-networkd[1303]: calide3e8821d8b: Gained carrier Dec 13 02:25:54.369802 systemd-networkd[1303]: cali89b8431f493: Link UP Dec 13 02:25:54.369878 systemd-networkd[1303]: calie68cbf3ea8b: Link UP Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.268 [INFO][4778] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0 csi-node-driver- calico-system a5f62aeb-bf31-464b-83a9-f8b3e9bf766d 762 0 2024-12-13 02:25:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e csi-node-driver-9dgt2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calide3e8821d8b [] []}} ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.269 [INFO][4778] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.288 [INFO][4842] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" HandleID="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.295 [INFO][4842] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" HandleID="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f7ef0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"csi-node-driver-9dgt2", "timestamp":"2024-12-13 02:25:54.288244346 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.295 [INFO][4842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.295 [INFO][4842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.295 [INFO][4842] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.296 [INFO][4842] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.299 [INFO][4842] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.302 [INFO][4842] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.303 [INFO][4842] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.305 [INFO][4842] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.305 [INFO][4842] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.306 [INFO][4842] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6 Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.309 [INFO][4842] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.312 [INFO][4842] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.67/26] block=192.168.62.64/26 handle="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.312 [INFO][4842] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.67/26] handle="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.312 [INFO][4842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.376450 env[1567]: 2024-12-13 02:25:54.312 [INFO][4842] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.67/26] IPv6=[] ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" HandleID="k8s-pod-network.36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.313 [INFO][4778] cni-plugin/k8s.go 386: Populated endpoint ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"csi-node-driver-9dgt2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide3e8821d8b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.313 [INFO][4778] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.67/32] ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.313 [INFO][4778] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calide3e8821d8b ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.369 [INFO][4778] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.369 [INFO][4778] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6", Pod:"csi-node-driver-9dgt2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide3e8821d8b", MAC:"f2:20:35:1c:82:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.376887 env[1567]: 2024-12-13 02:25:54.374 [INFO][4778] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6" Namespace="calico-system" Pod="csi-node-driver-9dgt2" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:25:54.381560 env[1567]: time="2024-12-13T02:25:54.381527530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:54.381560 env[1567]: time="2024-12-13T02:25:54.381548981Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:54.381560 env[1567]: time="2024-12-13T02:25:54.381556024Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:54.381701 env[1567]: time="2024-12-13T02:25:54.381678503Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6 pid=4901 runtime=io.containerd.runc.v2 Dec 13 02:25:54.381000 audit[4900]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:54.381000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fffdaad08c0 a2=0 a3=7fffdaad08ac items=0 ppid=4015 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.381000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:54.390215 systemd[1]: Started cri-containerd-36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6.scope. Dec 13 02:25:54.397334 systemd-networkd[1303]: calie68cbf3ea8b: Gained carrier Dec 13 02:25:54.397420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie68cbf3ea8b: link becomes ready Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.277 [INFO][4794] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0 coredns-7db6d8ff4d- kube-system d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82 763 0 2024-12-13 02:25:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e coredns-7db6d8ff4d-qsgq5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie68cbf3ea8b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.277 [INFO][4794] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.292 [INFO][4852] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" HandleID="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.298 [INFO][4852] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" HandleID="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000699f20), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"coredns-7db6d8ff4d-qsgq5", "timestamp":"2024-12-13 02:25:54.292826469 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.298 [INFO][4852] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.312 [INFO][4852] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.312 [INFO][4852] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.313 [INFO][4852] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.316 [INFO][4852] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.319 [INFO][4852] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.320 [INFO][4852] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.322 [INFO][4852] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.322 [INFO][4852] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.323 [INFO][4852] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8 Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.326 [INFO][4852] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.329 [INFO][4852] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.68/26] block=192.168.62.64/26 handle="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.329 [INFO][4852] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.68/26] handle="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.329 [INFO][4852] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.405584 env[1567]: 2024-12-13 02:25:54.329 [INFO][4852] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.68/26] IPv6=[] ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" HandleID="k8s-pod-network.8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.330 [INFO][4794] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"coredns-7db6d8ff4d-qsgq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie68cbf3ea8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.331 [INFO][4794] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.68/32] ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.331 [INFO][4794] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie68cbf3ea8b ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.397 [INFO][4794] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.397 [INFO][4794] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8", Pod:"coredns-7db6d8ff4d-qsgq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie68cbf3ea8b", MAC:"32:e9:a0:37:69:08", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.405989 env[1567]: 2024-12-13 02:25:54.404 [INFO][4794] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-qsgq5" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:25:54.411096 env[1567]: time="2024-12-13T02:25:54.411041715Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:54.411096 env[1567]: time="2024-12-13T02:25:54.411065375Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:54.411096 env[1567]: time="2024-12-13T02:25:54.411072514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:54.411207 env[1567]: time="2024-12-13T02:25:54.411169435Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8 pid=4947 runtime=io.containerd.runc.v2 Dec 13 02:25:54.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit: BPF prog-id=173 op=LOAD Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4901 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613234373866353062383839343637356333643831343630306532 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4901 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613234373866353062383839343637356333643831343630306532 Dec 13 02:25:54.425376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali89b8431f493: link becomes ready Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.424000 audit: BPF prog-id=174 op=LOAD Dec 13 02:25:54.424000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003266a0 items=0 ppid=4901 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613234373866353062383839343637356333643831343630306532 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit: BPF prog-id=175 op=LOAD Dec 13 02:25:54.425000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003266e8 items=0 ppid=4901 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613234373866353062383839343637356333643831343630306532 Dec 13 02:25:54.425000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:25:54.425000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.425000 audit: BPF prog-id=176 op=LOAD Dec 13 02:25:54.425000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000326af8 items=0 ppid=4901 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613234373866353062383839343637356333643831343630306532 Dec 13 02:25:54.425222 systemd-networkd[1303]: cali89b8431f493: Gained carrier Dec 13 02:25:54.426422 systemd[1]: Started cri-containerd-8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8.scope. Dec 13 02:25:54.430690 env[1567]: time="2024-12-13T02:25:54.430658397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9dgt2,Uid:a5f62aeb-bf31-464b-83a9-f8b3e9bf766d,Namespace:calico-system,Attempt:1,} returns sandbox id \"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6\"" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.278 [INFO][4813] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0 calico-apiserver-55596fbc64- calico-apiserver 1a03e996-2637-4eb5-a94f-aedd3079d265 764 0 2024-12-13 02:25:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55596fbc64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e calico-apiserver-55596fbc64-wvbqt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali89b8431f493 [] []}} ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.279 [INFO][4813] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.293 [INFO][4857] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" HandleID="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.299 [INFO][4857] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" HandleID="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c82f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"calico-apiserver-55596fbc64-wvbqt", "timestamp":"2024-12-13 02:25:54.293941854 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.299 [INFO][4857] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.329 [INFO][4857] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.329 [INFO][4857] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.331 [INFO][4857] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.333 [INFO][4857] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.336 [INFO][4857] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.337 [INFO][4857] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.339 [INFO][4857] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.339 [INFO][4857] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.340 [INFO][4857] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7 Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.343 [INFO][4857] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.346 [INFO][4857] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.69/26] block=192.168.62.64/26 handle="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.346 [INFO][4857] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.69/26] handle="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.346 [INFO][4857] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:54.432083 env[1567]: 2024-12-13 02:25:54.346 [INFO][4857] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.69/26] IPv6=[] ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" HandleID="k8s-pod-network.8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.347 [INFO][4813] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a03e996-2637-4eb5-a94f-aedd3079d265", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"calico-apiserver-55596fbc64-wvbqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89b8431f493", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.347 [INFO][4813] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.69/32] ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.347 [INFO][4813] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali89b8431f493 ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.424 [INFO][4813] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.425 [INFO][4813] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a03e996-2637-4eb5-a94f-aedd3079d265", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7", Pod:"calico-apiserver-55596fbc64-wvbqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89b8431f493", MAC:"ee:42:25:89:c7:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:54.432755 env[1567]: 2024-12-13 02:25:54.431 [INFO][4813] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7" Namespace="calico-apiserver" Pod="calico-apiserver-55596fbc64-wvbqt" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit: BPF prog-id=177 op=LOAD Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4947 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333864336236633962313037386132643762656639386639373166 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4947 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333864336236633962313037386132643762656639386639373166 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit: BPF prog-id=178 op=LOAD Dec 13 02:25:54.433000 audit[4956]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029db20 items=0 ppid=4947 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333864336236633962313037386132643762656639386639373166 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit: BPF prog-id=179 op=LOAD Dec 13 02:25:54.433000 audit[4956]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029db68 items=0 ppid=4947 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333864336236633962313037386132643762656639386639373166 Dec 13 02:25:54.433000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:25:54.433000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { perfmon } for pid=4956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit[4956]: AVC avc: denied { bpf } for pid=4956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.433000 audit: BPF prog-id=180 op=LOAD Dec 13 02:25:54.433000 audit[4956]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029df78 items=0 ppid=4947 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333864336236633962313037386132643762656639386639373166 Dec 13 02:25:54.437485 env[1567]: time="2024-12-13T02:25:54.437447202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:54.437485 env[1567]: time="2024-12-13T02:25:54.437473622Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:54.437580 env[1567]: time="2024-12-13T02:25:54.437484924Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:54.437580 env[1567]: time="2024-12-13T02:25:54.437551272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7 pid=4996 runtime=io.containerd.runc.v2 Dec 13 02:25:54.438000 audit[5002]: NETFILTER_CFG table=filter:106 family=2 entries=70 op=nft_register_chain pid=5002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:54.438000 audit[5002]: SYSCALL arch=c000003e syscall=46 success=yes exit=39688 a0=3 a1=7ffc74cf79b0 a2=0 a3=7ffc74cf799c items=0 ppid=4015 pid=5002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.438000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:54.443073 systemd[1]: Started cri-containerd-8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7.scope. Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit: BPF prog-id=181 op=LOAD Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4996 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373333373839376235626135643662646635376337343231303766 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4996 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373333373839376235626135643662646635376337343231303766 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit: BPF prog-id=182 op=LOAD Dec 13 02:25:54.449000 audit[5007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dbce0 items=0 ppid=4996 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373333373839376235626135643662646635376337343231303766 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit: BPF prog-id=183 op=LOAD Dec 13 02:25:54.449000 audit[5007]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000dbd28 items=0 ppid=4996 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373333373839376235626135643662646635376337343231303766 Dec 13 02:25:54.449000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:25:54.449000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { perfmon } for pid=5007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit[5007]: AVC avc: denied { bpf } for pid=5007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.449000 audit: BPF prog-id=184 op=LOAD Dec 13 02:25:54.449000 audit[5007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003de138 items=0 ppid=4996 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373333373839376235626135643662646635376337343231303766 Dec 13 02:25:54.451736 env[1567]: time="2024-12-13T02:25:54.450666846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-qsgq5,Uid:d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82,Namespace:kube-system,Attempt:1,} returns sandbox id \"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8\"" Dec 13 02:25:54.451984 env[1567]: time="2024-12-13T02:25:54.451967697Z" level=info msg="CreateContainer within sandbox \"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:25:54.456633 env[1567]: time="2024-12-13T02:25:54.456613478Z" level=info msg="CreateContainer within sandbox \"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"afc77b90f3ae10e5a3eaf8efee43899fcb3fae2a2e7eda2a9ded4cb8decddd4e\"" Dec 13 02:25:54.456843 env[1567]: time="2024-12-13T02:25:54.456805811Z" level=info msg="StartContainer for \"afc77b90f3ae10e5a3eaf8efee43899fcb3fae2a2e7eda2a9ded4cb8decddd4e\"" Dec 13 02:25:54.463909 systemd[1]: Started cri-containerd-afc77b90f3ae10e5a3eaf8efee43899fcb3fae2a2e7eda2a9ded4cb8decddd4e.scope. Dec 13 02:25:54.466754 env[1567]: time="2024-12-13T02:25:54.466730320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55596fbc64-wvbqt,Uid:1a03e996-2637-4eb5-a94f-aedd3079d265,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7\"" Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit: BPF prog-id=185 op=LOAD Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4947 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633737623930663361653130653561336561663865666565343338 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4947 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633737623930663361653130653561336561663865666565343338 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit: BPF prog-id=186 op=LOAD Dec 13 02:25:54.470000 audit[5038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000306980 items=0 ppid=4947 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633737623930663361653130653561336561663865666565343338 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit: BPF prog-id=187 op=LOAD Dec 13 02:25:54.470000 audit[5038]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003069c8 items=0 ppid=4947 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633737623930663361653130653561336561663865666565343338 Dec 13 02:25:54.470000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:25:54.470000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { perfmon } for pid=5038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit[5038]: AVC avc: denied { bpf } for pid=5038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.470000 audit: BPF prog-id=188 op=LOAD Dec 13 02:25:54.470000 audit[5038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000306dd8 items=0 ppid=4947 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633737623930663361653130653561336561663865666565343338 Dec 13 02:25:54.477074 env[1567]: time="2024-12-13T02:25:54.477049411Z" level=info msg="StartContainer for \"afc77b90f3ae10e5a3eaf8efee43899fcb3fae2a2e7eda2a9ded4cb8decddd4e\" returns successfully" Dec 13 02:25:54.804353 env[1567]: time="2024-12-13T02:25:54.804303153Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:54.804863 env[1567]: time="2024-12-13T02:25:54.804819887Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:54.805512 env[1567]: time="2024-12-13T02:25:54.805468580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:54.806142 env[1567]: time="2024-12-13T02:25:54.806103716Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:54.806761 env[1567]: time="2024-12-13T02:25:54.806717114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:25:54.807452 env[1567]: time="2024-12-13T02:25:54.807410908Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:25:54.808203 env[1567]: time="2024-12-13T02:25:54.808174536Z" level=info msg="CreateContainer within sandbox \"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:25:54.812579 env[1567]: time="2024-12-13T02:25:54.812563707Z" level=info msg="CreateContainer within sandbox \"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"12319855c0af05a0d08f881dc56fd716d787b007f227d8c312204c59ad5e7a11\"" Dec 13 02:25:54.812802 env[1567]: time="2024-12-13T02:25:54.812769742Z" level=info msg="StartContainer for \"12319855c0af05a0d08f881dc56fd716d787b007f227d8c312204c59ad5e7a11\"" Dec 13 02:25:54.821231 systemd[1]: Started cri-containerd-12319855c0af05a0d08f881dc56fd716d787b007f227d8c312204c59ad5e7a11.scope. Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit: BPF prog-id=189 op=LOAD Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4354 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333139383535633061663035613064303866383831646335366664 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4354 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333139383535633061663035613064303866383831646335366664 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit: BPF prog-id=190 op=LOAD Dec 13 02:25:54.828000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000241820 items=0 ppid=4354 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333139383535633061663035613064303866383831646335366664 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit: BPF prog-id=191 op=LOAD Dec 13 02:25:54.828000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000241868 items=0 ppid=4354 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333139383535633061663035613064303866383831646335366664 Dec 13 02:25:54.828000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:25:54.828000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { perfmon } for pid=5096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit[5096]: AVC avc: denied { bpf } for pid=5096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:54.828000 audit: BPF prog-id=192 op=LOAD Dec 13 02:25:54.828000 audit[5096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000241c78 items=0 ppid=4354 pid=5096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:54.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333139383535633061663035613064303866383831646335366664 Dec 13 02:25:54.845186 env[1567]: time="2024-12-13T02:25:54.845132101Z" level=info msg="StartContainer for \"12319855c0af05a0d08f881dc56fd716d787b007f227d8c312204c59ad5e7a11\" returns successfully" Dec 13 02:25:55.201394 env[1567]: time="2024-12-13T02:25:55.201322641Z" level=info msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.226 [INFO][5154] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.226 [INFO][5154] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" iface="eth0" netns="/var/run/netns/cni-5c97203c-5bae-e89e-d5b5-54bab38272b6" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.226 [INFO][5154] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" iface="eth0" netns="/var/run/netns/cni-5c97203c-5bae-e89e-d5b5-54bab38272b6" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.226 [INFO][5154] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" iface="eth0" netns="/var/run/netns/cni-5c97203c-5bae-e89e-d5b5-54bab38272b6" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.227 [INFO][5154] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.227 [INFO][5154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.241 [INFO][5170] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.241 [INFO][5170] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.241 [INFO][5170] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.246 [WARNING][5170] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.246 [INFO][5170] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.247 [INFO][5170] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:55.249212 env[1567]: 2024-12-13 02:25:55.248 [INFO][5154] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:25:55.249939 env[1567]: time="2024-12-13T02:25:55.249304813Z" level=info msg="TearDown network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" successfully" Dec 13 02:25:55.249939 env[1567]: time="2024-12-13T02:25:55.249329768Z" level=info msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" returns successfully" Dec 13 02:25:55.249939 env[1567]: time="2024-12-13T02:25:55.249851564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fd99f6b77-q97mf,Uid:e138edf7-6d14-4356-a916-344073dbb011,Namespace:calico-system,Attempt:1,}" Dec 13 02:25:55.265313 systemd[1]: run-netns-cni\x2d5c97203c\x2d5bae\x2de89e\x2dd5b5\x2d54bab38272b6.mount: Deactivated successfully. Dec 13 02:25:55.341344 systemd-networkd[1303]: calif9ac5b3e85f: Link UP Dec 13 02:25:55.393411 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:25:55.393475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif9ac5b3e85f: link becomes ready Dec 13 02:25:55.393594 systemd-networkd[1303]: calif9ac5b3e85f: Gained carrier Dec 13 02:25:55.445836 kubelet[2635]: I1213 02:25:55.445464 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-qsgq5" podStartSLOduration=31.445412577 podStartE2EDuration="31.445412577s" podCreationTimestamp="2024-12-13 02:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:55.445331821 +0000 UTC m=+45.294430243" watchObservedRunningTime="2024-12-13 02:25:55.445412577 +0000 UTC m=+45.294511002" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.282 [INFO][5185] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0 calico-kube-controllers-5fd99f6b77- calico-system e138edf7-6d14-4356-a916-344073dbb011 785 0 2024-12-13 02:25:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5fd99f6b77 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-f1dd79c03e calico-kube-controllers-5fd99f6b77-q97mf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif9ac5b3e85f [] []}} ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.282 [INFO][5185] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.307 [INFO][5210] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" HandleID="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.315 [INFO][5210] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" HandleID="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c9090), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-f1dd79c03e", "pod":"calico-kube-controllers-5fd99f6b77-q97mf", "timestamp":"2024-12-13 02:25:55.307389671 +0000 UTC"}, Hostname:"ci-3510.3.6-a-f1dd79c03e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.315 [INFO][5210] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.315 [INFO][5210] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.315 [INFO][5210] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-f1dd79c03e' Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.316 [INFO][5210] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.320 [INFO][5210] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.324 [INFO][5210] ipam/ipam.go 489: Trying affinity for 192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.326 [INFO][5210] ipam/ipam.go 155: Attempting to load block cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.328 [INFO][5210] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.64/26 host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.328 [INFO][5210] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.64/26 handle="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.330 [INFO][5210] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.333 [INFO][5210] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.62.64/26 handle="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.338 [INFO][5210] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.62.70/26] block=192.168.62.64/26 handle="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.338 [INFO][5210] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.70/26] handle="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" host="ci-3510.3.6-a-f1dd79c03e" Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.338 [INFO][5210] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:25:55.449971 env[1567]: 2024-12-13 02:25:55.338 [INFO][5210] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.62.70/26] IPv6=[] ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" HandleID="k8s-pod-network.07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.340 [INFO][5185] cni-plugin/k8s.go 386: Populated endpoint ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0", GenerateName:"calico-kube-controllers-5fd99f6b77-", Namespace:"calico-system", SelfLink:"", UID:"e138edf7-6d14-4356-a916-344073dbb011", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fd99f6b77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"", Pod:"calico-kube-controllers-5fd99f6b77-q97mf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ac5b3e85f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.340 [INFO][5185] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.62.70/32] ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.340 [INFO][5185] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif9ac5b3e85f ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.393 [INFO][5185] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.393 [INFO][5185] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0", GenerateName:"calico-kube-controllers-5fd99f6b77-", Namespace:"calico-system", SelfLink:"", UID:"e138edf7-6d14-4356-a916-344073dbb011", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fd99f6b77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae", Pod:"calico-kube-controllers-5fd99f6b77-q97mf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ac5b3e85f", MAC:"22:66:0a:55:5b:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:25:55.453316 env[1567]: 2024-12-13 02:25:55.446 [INFO][5185] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae" Namespace="calico-system" Pod="calico-kube-controllers-5fd99f6b77-q97mf" WorkloadEndpoint="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:25:55.468000 audit[5239]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:55.468000 audit[5239]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd9cd528b0 a2=0 a3=7ffd9cd5289c items=0 ppid=2913 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:55.490000 audit[5239]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:55.490000 audit[5239]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd9cd528b0 a2=0 a3=7ffd9cd5289c items=0 ppid=2913 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:55.493748 kubelet[2635]: I1213 02:25:55.493693 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-55596fbc64-5pkdn" podStartSLOduration=22.817259011 podStartE2EDuration="25.49367716s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:52.130884752 +0000 UTC m=+41.979983084" lastFinishedPulling="2024-12-13 02:25:54.807302897 +0000 UTC m=+44.656401233" observedRunningTime="2024-12-13 02:25:55.493596128 +0000 UTC m=+45.342694482" watchObservedRunningTime="2024-12-13 02:25:55.49367716 +0000 UTC m=+45.342775504" Dec 13 02:25:55.496921 env[1567]: time="2024-12-13T02:25:55.496867655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:25:55.496921 env[1567]: time="2024-12-13T02:25:55.496899648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:25:55.496921 env[1567]: time="2024-12-13T02:25:55.496915768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:25:55.497105 env[1567]: time="2024-12-13T02:25:55.497022616Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae pid=5246 runtime=io.containerd.runc.v2 Dec 13 02:25:55.502000 audit[5263]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=5263 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:25:55.502000 audit[5263]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffcb45c3dc0 a2=0 a3=7ffcb45c3dac items=0 ppid=4015 pid=5263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:25:55.507541 systemd[1]: Started cri-containerd-07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae.scope. Dec 13 02:25:55.510000 audit[5275]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:55.510000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff2bce0210 a2=0 a3=7fff2bce01fc items=0 ppid=2913 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit: BPF prog-id=193 op=LOAD Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633638376461336234323331663334663661323030643434346133 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633638376461336234323331663334663661323030643434346133 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit: BPF prog-id=194 op=LOAD Dec 13 02:25:55.513000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00025ddf0 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633638376461336234323331663334663661323030643434346133 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit: BPF prog-id=195 op=LOAD Dec 13 02:25:55.513000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00025de38 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633638376461336234323331663334663661323030643434346133 Dec 13 02:25:55.513000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:25:55.513000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:55.513000 audit: BPF prog-id=196 op=LOAD Dec 13 02:25:55.513000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c2248 items=0 ppid=5246 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633638376461336234323331663334663661323030643434346133 Dec 13 02:25:55.527000 audit[5275]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:55.527000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff2bce0210 a2=0 a3=7fff2bce01fc items=0 ppid=2913 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:55.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:55.529464 env[1567]: time="2024-12-13T02:25:55.529411638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5fd99f6b77-q97mf,Uid:e138edf7-6d14-4356-a916-344073dbb011,Namespace:calico-system,Attempt:1,} returns sandbox id \"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae\"" Dec 13 02:25:55.645000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:25:55.645000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ce3840 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:25:55.645000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:25:56.105460 systemd-networkd[1303]: cali89b8431f493: Gained IPv6LL Dec 13 02:25:56.168458 systemd-networkd[1303]: calide3e8821d8b: Gained IPv6LL Dec 13 02:25:56.178533 env[1567]: time="2024-12-13T02:25:56.178509941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.179136 env[1567]: time="2024-12-13T02:25:56.179121796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.179712 env[1567]: time="2024-12-13T02:25:56.179696957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.180422 env[1567]: time="2024-12-13T02:25:56.180410505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.180768 env[1567]: time="2024-12-13T02:25:56.180755159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:25:56.181315 env[1567]: time="2024-12-13T02:25:56.181301896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:25:56.181925 env[1567]: time="2024-12-13T02:25:56.181908173Z" level=info msg="CreateContainer within sandbox \"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:25:56.188480 env[1567]: time="2024-12-13T02:25:56.188429862Z" level=info msg="CreateContainer within sandbox \"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3aeda9eaa902a912f95c31d527ae50249d3b58eb8ead735166e55d7d7e075612\"" Dec 13 02:25:56.188707 env[1567]: time="2024-12-13T02:25:56.188687348Z" level=info msg="StartContainer for \"3aeda9eaa902a912f95c31d527ae50249d3b58eb8ead735166e55d7d7e075612\"" Dec 13 02:25:56.197027 systemd[1]: Started cri-containerd-3aeda9eaa902a912f95c31d527ae50249d3b58eb8ead735166e55d7d7e075612.scope. Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7efc2e5ffcc8 items=0 ppid=4901 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656461396561613930326139313266393563333164353237616535 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit: BPF prog-id=197 op=LOAD Dec 13 02:25:56.205000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00027bc58 items=0 ppid=4901 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656461396561613930326139313266393563333164353237616535 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit: BPF prog-id=198 op=LOAD Dec 13 02:25:56.205000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00027bca8 items=0 ppid=4901 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656461396561613930326139313266393563333164353237616535 Dec 13 02:25:56.205000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:25:56.205000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.205000 audit: BPF prog-id=199 op=LOAD Dec 13 02:25:56.205000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00027bd38 items=0 ppid=4901 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656461396561613930326139313266393563333164353237616535 Dec 13 02:25:56.211287 env[1567]: time="2024-12-13T02:25:56.211259705Z" level=info msg="StartContainer for \"3aeda9eaa902a912f95c31d527ae50249d3b58eb8ead735166e55d7d7e075612\" returns successfully" Dec 13 02:25:56.297641 systemd-networkd[1303]: calie68cbf3ea8b: Gained IPv6LL Dec 13 02:25:56.561350 env[1567]: time="2024-12-13T02:25:56.561239695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.563142 env[1567]: time="2024-12-13T02:25:56.563068841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.566233 env[1567]: time="2024-12-13T02:25:56.566137201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.566000 audit[5320]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=5320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:56.569938 env[1567]: time="2024-12-13T02:25:56.569826551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:56.571384 env[1567]: time="2024-12-13T02:25:56.571300666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:25:56.574013 env[1567]: time="2024-12-13T02:25:56.573943507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:25:56.576287 env[1567]: time="2024-12-13T02:25:56.576204136Z" level=info msg="CreateContainer within sandbox \"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:25:56.598475 kernel: kauditd_printk_skb: 588 callbacks suppressed Dec 13 02:25:56.598958 kernel: audit: type=1325 audit(1734056756.566:1286): table=filter:112 family=2 entries=9 op=nft_register_rule pid=5320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:56.652384 kernel: audit: type=1300 audit(1734056756.566:1286): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd8d138810 a2=0 a3=7ffd8d1387fc items=0 ppid=2913 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.566000 audit[5320]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd8d138810 a2=0 a3=7ffd8d1387fc items=0 ppid=2913 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:56.742419 kernel: audit: type=1327 audit(1734056756.566:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:56.744000 audit[5320]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=5320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:56.795400 kernel: audit: type=1325 audit(1734056756.744:1287): table=nat:113 family=2 entries=27 op=nft_register_chain pid=5320 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:56.796944 env[1567]: time="2024-12-13T02:25:56.796915156Z" level=info msg="CreateContainer within sandbox \"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7f586d4af13799fcc4a72b86a72bd7d4cf920fefcea126f216a39dd4ff7b9c61\"" Dec 13 02:25:56.797258 env[1567]: time="2024-12-13T02:25:56.797239786Z" level=info msg="StartContainer for \"7f586d4af13799fcc4a72b86a72bd7d4cf920fefcea126f216a39dd4ff7b9c61\"" Dec 13 02:25:56.807232 systemd[1]: Started cri-containerd-7f586d4af13799fcc4a72b86a72bd7d4cf920fefcea126f216a39dd4ff7b9c61.scope. Dec 13 02:25:56.744000 audit[5320]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd8d138810 a2=0 a3=7ffd8d1387fc items=0 ppid=2913 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.938700 kernel: audit: type=1300 audit(1734056756.744:1287): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd8d138810 a2=0 a3=7ffd8d1387fc items=0 ppid=2913 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.938799 kernel: audit: type=1327 audit(1734056756.744:1287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:56.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.050610 kernel: audit: type=1400 audit(1734056756.856:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.050654 kernel: audit: type=1400 audit(1734056756.856:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110362 kernel: audit: type=1400 audit(1734056756.856:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.170445 kernel: audit: type=1400 audit(1734056756.856:1291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.192510 systemd-networkd[1303]: calif9ac5b3e85f: Gained IPv6LL Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit: BPF prog-id=200 op=LOAD Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4996 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766353836643461663133373939666363346137326238366137326264 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4996 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766353836643461663133373939666363346137326238366137326264 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:56.991000 audit: BPF prog-id=201 op=LOAD Dec 13 02:25:56.991000 audit[5328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002fe4d0 items=0 ppid=4996 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766353836643461663133373939666363346137326238366137326264 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.110000 audit: BPF prog-id=202 op=LOAD Dec 13 02:25:57.110000 audit[5328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002fe518 items=0 ppid=4996 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:57.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766353836643461663133373939666363346137326238366137326264 Dec 13 02:25:57.230000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:25:57.230000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { perfmon } for pid=5328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit[5328]: AVC avc: denied { bpf } for pid=5328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:57.230000 audit: BPF prog-id=203 op=LOAD Dec 13 02:25:57.230000 audit[5328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002fe928 items=0 ppid=4996 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:57.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766353836643461663133373939666363346137326238366137326264 Dec 13 02:25:57.247282 env[1567]: time="2024-12-13T02:25:57.247230450Z" level=info msg="StartContainer for \"7f586d4af13799fcc4a72b86a72bd7d4cf920fefcea126f216a39dd4ff7b9c61\" returns successfully" Dec 13 02:25:57.367182 kubelet[2635]: I1213 02:25:57.367153 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-55596fbc64-wvbqt" podStartSLOduration=25.261068058 podStartE2EDuration="27.367142788s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:54.467339516 +0000 UTC m=+44.316437848" lastFinishedPulling="2024-12-13 02:25:56.573414182 +0000 UTC m=+46.422512578" observedRunningTime="2024-12-13 02:25:57.366638418 +0000 UTC m=+47.215736753" watchObservedRunningTime="2024-12-13 02:25:57.367142788 +0000 UTC m=+47.216241120" Dec 13 02:25:57.852000 audit[5379]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:57.852000 audit[5379]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed37d34e0 a2=0 a3=7ffed37d34cc items=0 ppid=2913 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:57.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:57.862000 audit[5379]: NETFILTER_CFG table=nat:115 family=2 entries=30 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:25:57.862000 audit[5379]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffed37d34e0 a2=0 a3=7ffed37d34cc items=0 ppid=2913 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:57.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:25:57.903000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:25:57.903000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001000060 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:25:57.903000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:25:58.366872 kubelet[2635]: I1213 02:25:58.366815 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:25:58.996777 env[1567]: time="2024-12-13T02:25:58.996714535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:58.997347 env[1567]: time="2024-12-13T02:25:58.997306892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:58.998075 env[1567]: time="2024-12-13T02:25:58.998061314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:58.999949 env[1567]: time="2024-12-13T02:25:58.999932375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:25:59.000175 env[1567]: time="2024-12-13T02:25:59.000160118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:25:59.000709 env[1567]: time="2024-12-13T02:25:59.000696127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:25:59.004151 env[1567]: time="2024-12-13T02:25:59.004132359Z" level=info msg="CreateContainer within sandbox \"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:25:59.008583 env[1567]: time="2024-12-13T02:25:59.008536945Z" level=info msg="CreateContainer within sandbox \"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"96c371f533caf345036943a653bd4b9d29d759a1616071d5c69670b77dc390dc\"" Dec 13 02:25:59.008776 env[1567]: time="2024-12-13T02:25:59.008762549Z" level=info msg="StartContainer for \"96c371f533caf345036943a653bd4b9d29d759a1616071d5c69670b77dc390dc\"" Dec 13 02:25:59.018026 systemd[1]: Started cri-containerd-96c371f533caf345036943a653bd4b9d29d759a1616071d5c69670b77dc390dc.scope. Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit: BPF prog-id=204 op=LOAD Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5246 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:59.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633337316635333363616633343530333639343361363533626434 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5246 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:59.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633337316635333363616633343530333639343361363533626434 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit: BPF prog-id=205 op=LOAD Dec 13 02:25:59.022000 audit[5389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00043e020 items=0 ppid=5246 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:59.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633337316635333363616633343530333639343361363533626434 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit: BPF prog-id=206 op=LOAD Dec 13 02:25:59.022000 audit[5389]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00043e068 items=0 ppid=5246 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:59.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633337316635333363616633343530333639343361363533626434 Dec 13 02:25:59.022000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:25:59.022000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:25:59.022000 audit: BPF prog-id=207 op=LOAD Dec 13 02:25:59.022000 audit[5389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00043e478 items=0 ppid=5246 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:25:59.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633337316635333363616633343530333639343361363533626434 Dec 13 02:25:59.040489 env[1567]: time="2024-12-13T02:25:59.040433009Z" level=info msg="StartContainer for \"96c371f533caf345036943a653bd4b9d29d759a1616071d5c69670b77dc390dc\" returns successfully" Dec 13 02:25:59.397197 kubelet[2635]: I1213 02:25:59.396994 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5fd99f6b77-q97mf" podStartSLOduration=25.926351539 podStartE2EDuration="29.396958325s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:55.530016285 +0000 UTC m=+45.379114621" lastFinishedPulling="2024-12-13 02:25:59.000623061 +0000 UTC m=+48.849721407" observedRunningTime="2024-12-13 02:25:59.395984306 +0000 UTC m=+49.245082716" watchObservedRunningTime="2024-12-13 02:25:59.396958325 +0000 UTC m=+49.246056705" Dec 13 02:26:00.374877 kubelet[2635]: I1213 02:26:00.374861 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:26:00.418614 env[1567]: time="2024-12-13T02:26:00.418561692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:26:00.419150 env[1567]: time="2024-12-13T02:26:00.419110868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:26:00.419728 env[1567]: time="2024-12-13T02:26:00.419688585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:26:00.420464 env[1567]: time="2024-12-13T02:26:00.420389943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:26:00.420683 env[1567]: time="2024-12-13T02:26:00.420640501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:26:00.421866 env[1567]: time="2024-12-13T02:26:00.421824785Z" level=info msg="CreateContainer within sandbox \"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:26:00.426529 env[1567]: time="2024-12-13T02:26:00.426484197Z" level=info msg="CreateContainer within sandbox \"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8789441b0d347924865a9a8f3f696ca96605808bcb046bece75c0fd0516e79e8\"" Dec 13 02:26:00.426802 env[1567]: time="2024-12-13T02:26:00.426770283Z" level=info msg="StartContainer for \"8789441b0d347924865a9a8f3f696ca96605808bcb046bece75c0fd0516e79e8\"" Dec 13 02:26:00.437049 systemd[1]: Started cri-containerd-8789441b0d347924865a9a8f3f696ca96605808bcb046bece75c0fd0516e79e8.scope. Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2c42ad6118 items=0 ppid=4901 pid=5440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383934343162306433343739323438363561396138663366363936 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit: BPF prog-id=208 op=LOAD Dec 13 02:26:00.442000 audit[5440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fff68 items=0 ppid=4901 pid=5440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383934343162306433343739323438363561396138663366363936 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit: BPF prog-id=209 op=LOAD Dec 13 02:26:00.442000 audit[5440]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fffb8 items=0 ppid=4901 pid=5440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383934343162306433343739323438363561396138663366363936 Dec 13 02:26:00.442000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:26:00.442000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { perfmon } for pid=5440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit[5440]: AVC avc: denied { bpf } for pid=5440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:26:00.442000 audit: BPF prog-id=210 op=LOAD Dec 13 02:26:00.442000 audit[5440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea048 items=0 ppid=4901 pid=5440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383934343162306433343739323438363561396138663366363936 Dec 13 02:26:00.449125 env[1567]: time="2024-12-13T02:26:00.449099340Z" level=info msg="StartContainer for \"8789441b0d347924865a9a8f3f696ca96605808bcb046bece75c0fd0516e79e8\" returns successfully" Dec 13 02:26:01.249842 kubelet[2635]: I1213 02:26:01.249789 2635 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:26:01.249842 kubelet[2635]: I1213 02:26:01.249850 2635 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:26:01.409771 kubelet[2635]: I1213 02:26:01.409631 2635 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9dgt2" podStartSLOduration=25.420146088 podStartE2EDuration="31.409579326s" podCreationTimestamp="2024-12-13 02:25:30 +0000 UTC" firstStartedPulling="2024-12-13 02:25:54.431612089 +0000 UTC m=+44.280710424" lastFinishedPulling="2024-12-13 02:26:00.421045325 +0000 UTC m=+50.270143662" observedRunningTime="2024-12-13 02:26:01.409124574 +0000 UTC m=+51.258222980" watchObservedRunningTime="2024-12-13 02:26:01.409579326 +0000 UTC m=+51.258677716" Dec 13 02:26:06.426000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.467438 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 02:26:06.467538 kernel: audit: type=1400 audit(1734056766.426:1333): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.426000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d236e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:06.664603 kernel: audit: type=1300 audit(1734056766.426:1333): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d236e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:06.664649 kernel: audit: type=1327 audit(1734056766.426:1333): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:06.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:06.752074 kernel: audit: type=1400 audit(1734056766.426:1334): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.426000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.837243 kernel: audit: type=1300 audit(1734056766.426:1334): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a76750 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:06.426000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a76750 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:06.949717 kernel: audit: type=1327 audit(1734056766.426:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:06.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:07.039029 kernel: audit: type=1400 audit(1734056766.585:1335): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:07.128180 kernel: audit: type=1300 audit(1734056766.585:1335): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004ed7aa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004ed7aa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:07.227356 kernel: audit: type=1327 audit(1734056766.585:1335): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:07.321510 kernel: audit: type=1400 audit(1734056766.585:1336): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c004ed7ac0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c008b87950 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008a3d5c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003a01680 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:06.585000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:06.585000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c008b87a70 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:26:06.585000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:26:08.084608 kubelet[2635]: I1213 02:26:08.084538 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:26:10.197957 env[1567]: time="2024-12-13T02:26:10.197905862Z" level=info msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.232 [WARNING][5537] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"51eb8ded-d184-4bf5-b4cf-a82044b2bc49", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1", Pod:"calico-apiserver-55596fbc64-5pkdn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89d51d63579", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.233 [INFO][5537] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.233 [INFO][5537] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" iface="eth0" netns="" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.233 [INFO][5537] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.233 [INFO][5537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.249 [INFO][5552] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.249 [INFO][5552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.249 [INFO][5552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.254 [WARNING][5552] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.254 [INFO][5552] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.256 [INFO][5552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.258030 env[1567]: 2024-12-13 02:26:10.256 [INFO][5537] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.258030 env[1567]: time="2024-12-13T02:26:10.257952796Z" level=info msg="TearDown network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" successfully" Dec 13 02:26:10.258030 env[1567]: time="2024-12-13T02:26:10.257979202Z" level=info msg="StopPodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" returns successfully" Dec 13 02:26:10.258901 env[1567]: time="2024-12-13T02:26:10.258398694Z" level=info msg="RemovePodSandbox for \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" Dec 13 02:26:10.258901 env[1567]: time="2024-12-13T02:26:10.258427147Z" level=info msg="Forcibly stopping sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\"" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.285 [WARNING][5581] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"51eb8ded-d184-4bf5-b4cf-a82044b2bc49", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"fedd12f98027df3241cecda758effcb0e2018b8b2ae40f82abaf95dd64dbe4e1", Pod:"calico-apiserver-55596fbc64-5pkdn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89d51d63579", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.285 [INFO][5581] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.285 [INFO][5581] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" iface="eth0" netns="" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.285 [INFO][5581] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.285 [INFO][5581] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.301 [INFO][5597] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.301 [INFO][5597] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.301 [INFO][5597] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.306 [WARNING][5597] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.306 [INFO][5597] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" HandleID="k8s-pod-network.42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--5pkdn-eth0" Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.308 [INFO][5597] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.309834 env[1567]: 2024-12-13 02:26:10.308 [INFO][5581] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a" Dec 13 02:26:10.310323 env[1567]: time="2024-12-13T02:26:10.309829336Z" level=info msg="TearDown network for sandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" successfully" Dec 13 02:26:10.311707 env[1567]: time="2024-12-13T02:26:10.311658709Z" level=info msg="RemovePodSandbox \"42d4480ab80126d5396fcf631de79d3643584fa32ced838996f0bc5c2366752a\" returns successfully" Dec 13 02:26:10.312073 env[1567]: time="2024-12-13T02:26:10.312031323Z" level=info msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.338 [WARNING][5628] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a03e996-2637-4eb5-a94f-aedd3079d265", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7", Pod:"calico-apiserver-55596fbc64-wvbqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89b8431f493", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.338 [INFO][5628] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.338 [INFO][5628] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" iface="eth0" netns="" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.338 [INFO][5628] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.338 [INFO][5628] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.353 [INFO][5642] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.353 [INFO][5642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.353 [INFO][5642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.358 [WARNING][5642] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.358 [INFO][5642] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.360 [INFO][5642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.362153 env[1567]: 2024-12-13 02:26:10.361 [INFO][5628] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.362688 env[1567]: time="2024-12-13T02:26:10.362174103Z" level=info msg="TearDown network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" successfully" Dec 13 02:26:10.362688 env[1567]: time="2024-12-13T02:26:10.362204021Z" level=info msg="StopPodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" returns successfully" Dec 13 02:26:10.362688 env[1567]: time="2024-12-13T02:26:10.362506168Z" level=info msg="RemovePodSandbox for \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" Dec 13 02:26:10.362688 env[1567]: time="2024-12-13T02:26:10.362533224Z" level=info msg="Forcibly stopping sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\"" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.391 [WARNING][5672] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0", GenerateName:"calico-apiserver-55596fbc64-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a03e996-2637-4eb5-a94f-aedd3079d265", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55596fbc64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8d7337897b5ba5d6bdf57c742107fdb8b36f53e73a2b1620df51097f2db6cfd7", Pod:"calico-apiserver-55596fbc64-wvbqt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.62.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali89b8431f493", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.391 [INFO][5672] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.391 [INFO][5672] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" iface="eth0" netns="" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.392 [INFO][5672] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.392 [INFO][5672] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.429 [INFO][5688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.429 [INFO][5688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.429 [INFO][5688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.435 [WARNING][5688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.435 [INFO][5688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" HandleID="k8s-pod-network.f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--apiserver--55596fbc64--wvbqt-eth0" Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.437 [INFO][5688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.438924 env[1567]: 2024-12-13 02:26:10.438 [INFO][5672] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81" Dec 13 02:26:10.439414 env[1567]: time="2024-12-13T02:26:10.438919230Z" level=info msg="TearDown network for sandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" successfully" Dec 13 02:26:10.440698 env[1567]: time="2024-12-13T02:26:10.440654472Z" level=info msg="RemovePodSandbox \"f5100776c80d147aa00d5b1e8e7ae197cc07ff04c0ecf56480bcf45ff87d1e81\" returns successfully" Dec 13 02:26:10.441055 env[1567]: time="2024-12-13T02:26:10.441013011Z" level=info msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.470 [WARNING][5720] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"77c27cf1-df4b-45e4-8b70-bcac642c213e", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17", Pod:"coredns-7db6d8ff4d-grddm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1584360fd7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.470 [INFO][5720] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.470 [INFO][5720] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" iface="eth0" netns="" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.470 [INFO][5720] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.470 [INFO][5720] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.486 [INFO][5736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.486 [INFO][5736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.486 [INFO][5736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.491 [WARNING][5736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.491 [INFO][5736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.493 [INFO][5736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.495238 env[1567]: 2024-12-13 02:26:10.494 [INFO][5720] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.495828 env[1567]: time="2024-12-13T02:26:10.495264660Z" level=info msg="TearDown network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" successfully" Dec 13 02:26:10.495828 env[1567]: time="2024-12-13T02:26:10.495294580Z" level=info msg="StopPodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" returns successfully" Dec 13 02:26:10.495828 env[1567]: time="2024-12-13T02:26:10.495653995Z" level=info msg="RemovePodSandbox for \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" Dec 13 02:26:10.495828 env[1567]: time="2024-12-13T02:26:10.495681158Z" level=info msg="Forcibly stopping sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\"" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.522 [WARNING][5765] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"77c27cf1-df4b-45e4-8b70-bcac642c213e", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"ac93a4d5af7e04951ddb30d7f32ffaf0bc4d03fe7ae3136e8d397cbd72cccf17", Pod:"coredns-7db6d8ff4d-grddm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1584360fd7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.523 [INFO][5765] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.523 [INFO][5765] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" iface="eth0" netns="" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.523 [INFO][5765] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.523 [INFO][5765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.538 [INFO][5779] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.538 [INFO][5779] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.538 [INFO][5779] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.543 [WARNING][5779] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.543 [INFO][5779] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" HandleID="k8s-pod-network.21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--grddm-eth0" Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.545 [INFO][5779] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.547009 env[1567]: 2024-12-13 02:26:10.546 [INFO][5765] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e" Dec 13 02:26:10.547537 env[1567]: time="2024-12-13T02:26:10.547031430Z" level=info msg="TearDown network for sandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" successfully" Dec 13 02:26:10.548863 env[1567]: time="2024-12-13T02:26:10.548843987Z" level=info msg="RemovePodSandbox \"21f0a9abefadfa7d3803d9e66636dc2eb0e60d8f30b8e0ca16a39c9dd97df89e\" returns successfully" Dec 13 02:26:10.549219 env[1567]: time="2024-12-13T02:26:10.549199739Z" level=info msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.576 [WARNING][5808] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0", GenerateName:"calico-kube-controllers-5fd99f6b77-", Namespace:"calico-system", SelfLink:"", UID:"e138edf7-6d14-4356-a916-344073dbb011", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fd99f6b77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae", Pod:"calico-kube-controllers-5fd99f6b77-q97mf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ac5b3e85f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.576 [INFO][5808] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.576 [INFO][5808] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" iface="eth0" netns="" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.576 [INFO][5808] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.576 [INFO][5808] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.592 [INFO][5824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.592 [INFO][5824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.592 [INFO][5824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.597 [WARNING][5824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.597 [INFO][5824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.599 [INFO][5824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.600999 env[1567]: 2024-12-13 02:26:10.600 [INFO][5808] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.600999 env[1567]: time="2024-12-13T02:26:10.600986427Z" level=info msg="TearDown network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" successfully" Dec 13 02:26:10.601576 env[1567]: time="2024-12-13T02:26:10.601012577Z" level=info msg="StopPodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" returns successfully" Dec 13 02:26:10.601576 env[1567]: time="2024-12-13T02:26:10.601323975Z" level=info msg="RemovePodSandbox for \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" Dec 13 02:26:10.601576 env[1567]: time="2024-12-13T02:26:10.601355708Z" level=info msg="Forcibly stopping sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\"" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.628 [WARNING][5856] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0", GenerateName:"calico-kube-controllers-5fd99f6b77-", Namespace:"calico-system", SelfLink:"", UID:"e138edf7-6d14-4356-a916-344073dbb011", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5fd99f6b77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"07c687da3b4231f34f6a200d444a33289be491e0b5282964ad4e1c0934c7e9ae", Pod:"calico-kube-controllers-5fd99f6b77-q97mf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.62.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ac5b3e85f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.628 [INFO][5856] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.628 [INFO][5856] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" iface="eth0" netns="" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.628 [INFO][5856] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.628 [INFO][5856] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.644 [INFO][5872] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.644 [INFO][5872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.644 [INFO][5872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.648 [WARNING][5872] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.648 [INFO][5872] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" HandleID="k8s-pod-network.32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-calico--kube--controllers--5fd99f6b77--q97mf-eth0" Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.650 [INFO][5872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.651822 env[1567]: 2024-12-13 02:26:10.651 [INFO][5856] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25" Dec 13 02:26:10.652257 env[1567]: time="2024-12-13T02:26:10.651850361Z" level=info msg="TearDown network for sandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" successfully" Dec 13 02:26:10.653545 env[1567]: time="2024-12-13T02:26:10.653491422Z" level=info msg="RemovePodSandbox \"32d654f3e18dd0aacd86c0033207654fb721436900b3c1550f00e7edc3058c25\" returns successfully" Dec 13 02:26:10.653851 env[1567]: time="2024-12-13T02:26:10.653802443Z" level=info msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.677 [WARNING][5901] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8", Pod:"coredns-7db6d8ff4d-qsgq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie68cbf3ea8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.678 [INFO][5901] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.678 [INFO][5901] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" iface="eth0" netns="" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.678 [INFO][5901] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.678 [INFO][5901] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.691 [INFO][5915] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.691 [INFO][5915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.691 [INFO][5915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.696 [WARNING][5915] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.696 [INFO][5915] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.697 [INFO][5915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.699342 env[1567]: 2024-12-13 02:26:10.698 [INFO][5901] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.699805 env[1567]: time="2024-12-13T02:26:10.699362194Z" level=info msg="TearDown network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" successfully" Dec 13 02:26:10.699805 env[1567]: time="2024-12-13T02:26:10.699398580Z" level=info msg="StopPodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" returns successfully" Dec 13 02:26:10.699805 env[1567]: time="2024-12-13T02:26:10.699697644Z" level=info msg="RemovePodSandbox for \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" Dec 13 02:26:10.699805 env[1567]: time="2024-12-13T02:26:10.699719025Z" level=info msg="Forcibly stopping sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\"" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.723 [WARNING][5946] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d7132bcf-c5eb-44b5-b16e-1a8dd28e3d82", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"8938d3b6c9b1078a2d7bef98f971f4533633c2e2eca64bd646cfdc7542b5d4f8", Pod:"coredns-7db6d8ff4d-qsgq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.62.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie68cbf3ea8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.723 [INFO][5946] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.723 [INFO][5946] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" iface="eth0" netns="" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.723 [INFO][5946] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.723 [INFO][5946] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.737 [INFO][5961] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.737 [INFO][5961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.737 [INFO][5961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.741 [WARNING][5961] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.741 [INFO][5961] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" HandleID="k8s-pod-network.60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-coredns--7db6d8ff4d--qsgq5-eth0" Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.743 [INFO][5961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.744956 env[1567]: 2024-12-13 02:26:10.744 [INFO][5946] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96" Dec 13 02:26:10.745525 env[1567]: time="2024-12-13T02:26:10.744952875Z" level=info msg="TearDown network for sandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" successfully" Dec 13 02:26:10.746888 env[1567]: time="2024-12-13T02:26:10.746838889Z" level=info msg="RemovePodSandbox \"60afe70a067653710587e011357fe204211a0087b7799dc80e9375fbb64e8b96\" returns successfully" Dec 13 02:26:10.747285 env[1567]: time="2024-12-13T02:26:10.747242769Z" level=info msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.782 [WARNING][5992] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6", Pod:"csi-node-driver-9dgt2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide3e8821d8b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.783 [INFO][5992] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.783 [INFO][5992] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" iface="eth0" netns="" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.783 [INFO][5992] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.783 [INFO][5992] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.804 [INFO][6008] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.804 [INFO][6008] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.804 [INFO][6008] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.811 [WARNING][6008] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.811 [INFO][6008] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.813 [INFO][6008] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.815423 env[1567]: 2024-12-13 02:26:10.814 [INFO][5992] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.816138 env[1567]: time="2024-12-13T02:26:10.815451169Z" level=info msg="TearDown network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" successfully" Dec 13 02:26:10.816138 env[1567]: time="2024-12-13T02:26:10.815484557Z" level=info msg="StopPodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" returns successfully" Dec 13 02:26:10.816138 env[1567]: time="2024-12-13T02:26:10.815943964Z" level=info msg="RemovePodSandbox for \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" Dec 13 02:26:10.816138 env[1567]: time="2024-12-13T02:26:10.815980610Z" level=info msg="Forcibly stopping sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\"" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.852 [WARNING][6039] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5f62aeb-bf31-464b-83a9-f8b3e9bf766d", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-f1dd79c03e", ContainerID:"36a2478f50b8894675c3d814600e25da41524e8c160da82378db4c5b28af72f6", Pod:"csi-node-driver-9dgt2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.62.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calide3e8821d8b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.853 [INFO][6039] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.853 [INFO][6039] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" iface="eth0" netns="" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.853 [INFO][6039] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.853 [INFO][6039] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.876 [INFO][6053] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.876 [INFO][6053] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.876 [INFO][6053] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.882 [WARNING][6053] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.882 [INFO][6053] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" HandleID="k8s-pod-network.cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Workload="ci--3510.3.6--a--f1dd79c03e-k8s-csi--node--driver--9dgt2-eth0" Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.884 [INFO][6053] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:26:10.886702 env[1567]: 2024-12-13 02:26:10.885 [INFO][6039] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282" Dec 13 02:26:10.887380 env[1567]: time="2024-12-13T02:26:10.886710041Z" level=info msg="TearDown network for sandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" successfully" Dec 13 02:26:10.889154 env[1567]: time="2024-12-13T02:26:10.889096446Z" level=info msg="RemovePodSandbox \"cd9fa272f68fb749b3b3047376afc6162780838159304521331b20a5dfbfd282\" returns successfully" Dec 13 02:26:23.925000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.954271 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:26:23.954329 kernel: audit: type=1400 audit(1734056783.925:1341): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.925000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009f7020 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:24.166643 kernel: audit: type=1300 audit(1734056783.925:1341): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009f7020 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:24.166713 kernel: audit: type=1327 audit(1734056783.925:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:23.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:24.259664 kernel: audit: type=1400 audit(1734056783.925:1342): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.925000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:24.349336 kernel: audit: type=1300 audit(1734056783.925:1342): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009f7040 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:23.925000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009f7040 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:24.469779 kernel: audit: type=1327 audit(1734056783.925:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:23.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:24.563015 kernel: audit: type=1400 audit(1734056783.927:1343): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.927000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:24.652889 kernel: audit: type=1300 audit(1734056783.927:1343): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eb1860 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:23.927000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eb1860 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:24.773392 kernel: audit: type=1327 audit(1734056783.927:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:23.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:24.866631 kernel: audit: type=1400 audit(1734056783.927:1344): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.927000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:26:23.927000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002aa3c00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:26:23.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:26:32.576255 kubelet[2635]: I1213 02:26:32.576124 2635 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:26:32.636000 audit[6130]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=6130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:26:32.665054 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:26:32.665109 kernel: audit: type=1325 audit(1734056792.636:1345): table=filter:116 family=2 entries=8 op=nft_register_rule pid=6130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:26:32.636000 audit[6130]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe96e5cc30 a2=0 a3=7ffe96e5cc1c items=0 ppid=2913 pid=6130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:32.724413 kernel: audit: type=1300 audit(1734056792.636:1345): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe96e5cc30 a2=0 a3=7ffe96e5cc1c items=0 ppid=2913 pid=6130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:32.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:26:32.878664 kernel: audit: type=1327 audit(1734056792.636:1345): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:26:32.880000 audit[6130]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=6130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:26:32.880000 audit[6130]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe96e5cc30 a2=0 a3=7ffe96e5cc1c items=0 ppid=2913 pid=6130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:33.038076 kernel: audit: type=1325 audit(1734056792.880:1346): table=nat:117 family=2 entries=34 op=nft_register_chain pid=6130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:26:33.038161 kernel: audit: type=1300 audit(1734056792.880:1346): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe96e5cc30 a2=0 a3=7ffe96e5cc1c items=0 ppid=2913 pid=6130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:26:33.038178 kernel: audit: type=1327 audit(1734056792.880:1346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:26:32.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:26:55.645000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:26:55.645000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001938200 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:26:55.866378 kernel: audit: type=1400 audit(1734056815.645:1347): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:26:55.866472 kernel: audit: type=1300 audit(1734056815.645:1347): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001938200 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:26:55.866492 kernel: audit: type=1327 audit(1734056815.645:1347): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:26:55.645000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:26:57.904000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:26:57.904000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0d4c0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:26:58.124342 kernel: audit: type=1400 audit(1734056817.904:1348): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:26:58.124405 kernel: audit: type=1300 audit(1734056817.904:1348): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0d4c0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:26:58.124437 kernel: audit: type=1327 audit(1734056817.904:1348): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:26:57.904000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:27:06.427000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.427000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022cebd0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:06.643133 kernel: audit: type=1400 audit(1734056826.427:1349): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.643190 kernel: audit: type=1300 audit(1734056826.427:1349): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022cebd0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:06.643208 kernel: audit: type=1327 audit(1734056826.427:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:06.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:06.427000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.826949 kernel: audit: type=1400 audit(1734056826.427:1350): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.826982 kernel: audit: type=1300 audit(1734056826.427:1350): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003868ac0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:06.427000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003868ac0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:06.948700 kernel: audit: type=1327 audit(1734056826.427:1350): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:06.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:07.042878 kernel: audit: type=1400 audit(1734056826.586:1351): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01367b680 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:07.233453 kernel: audit: type=1300 audit(1734056826.586:1351): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01367b680 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:07.233505 kernel: audit: type=1327 audit(1734056826.586:1351): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:07.327548 kernel: audit: type=1400 audit(1734056826.586:1352): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01379e390 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0136f4be0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013144f00 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01379e3f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:06.586000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013087020 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:27:06.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:27:23.926000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.955596 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:27:23.955635 kernel: audit: type=1400 audit(1734056843.926:1357): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.926000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869940 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:24.048384 kernel: audit: type=1300 audit(1734056843.926:1357): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869940 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:23.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:24.261681 kernel: audit: type=1327 audit(1734056843.926:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:24.261760 kernel: audit: type=1400 audit(1734056843.926:1358): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.926000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.926000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0036dc9e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:24.472373 kernel: audit: type=1300 audit(1734056843.926:1358): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0036dc9e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:24.472488 kernel: audit: type=1327 audit(1734056843.926:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:23.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:23.928000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:24.655751 kernel: audit: type=1400 audit(1734056843.928:1359): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.928000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003911680 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:24.656450 kernel: audit: type=1300 audit(1734056843.928:1359): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003911680 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:23.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:24.869864 kernel: audit: type=1327 audit(1734056843.928:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:24.869909 kernel: audit: type=1400 audit(1734056843.928:1360): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.928000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:27:23.928000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003a16f00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:27:23.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:27:55.646000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:27:55.674314 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:27:55.674369 kernel: audit: type=1400 audit(1734056875.646:1361): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:27:55.646000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019382e0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:27:55.888083 kernel: audit: type=1300 audit(1734056875.646:1361): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019382e0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:27:55.888121 kernel: audit: type=1327 audit(1734056875.646:1361): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:27:55.646000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:27:57.905000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:27:57.905000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00179ac80 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:27:58.122983 kernel: audit: type=1400 audit(1734056877.905:1362): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:27:58.123023 kernel: audit: type=1300 audit(1734056877.905:1362): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00179ac80 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:27:58.123045 kernel: audit: type=1327 audit(1734056877.905:1362): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:27:57.905000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:28:06.429000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.429000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869600 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:06.644669 kernel: audit: type=1400 audit(1734056886.429:1363): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.644725 kernel: audit: type=1300 audit(1734056886.429:1363): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869600 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:06.644742 kernel: audit: type=1327 audit(1734056886.429:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:06.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:06.737537 kernel: audit: type=1400 audit(1734056886.429:1364): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.429000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.828346 kernel: audit: type=1300 audit(1734056886.429:1364): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fcd5f0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:06.429000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fcd5f0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:06.948453 kernel: audit: type=1327 audit(1734056886.429:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:06.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:07.041262 kernel: audit: type=1400 audit(1734056886.587:1365): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:07.131891 kernel: audit: type=1300 audit(1734056886.587:1365): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f81ba70 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f81ba70 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:07.229987 kernel: audit: type=1327 audit(1734056886.587:1365): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:07.323750 kernel: audit: type=1400 audit(1734056886.587:1366): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00e2b3aa0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ed64de0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0078387e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ed64e10 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0074cc4a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:06.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:28:23.927000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:23.971576 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:28:23.971677 kernel: audit: type=1400 audit(1734056903.927:1371): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:23.927000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869c40 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:24.183918 kernel: audit: type=1300 audit(1734056903.927:1371): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003869c40 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:24.183995 kernel: audit: type=1327 audit(1734056903.927:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:23.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:24.277173 kernel: audit: type=1400 audit(1734056903.927:1372): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:23.927000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:24.367076 kernel: audit: type=1300 audit(1734056903.927:1372): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0036ddfc0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:23.927000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0036ddfc0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:24.487583 kernel: audit: type=1327 audit(1734056903.927:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:23.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:24.580826 kernel: audit: type=1400 audit(1734056903.929:1373): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:23.929000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:24.670720 kernel: audit: type=1400 audit(1734056903.929:1374): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:23.929000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:28:24.760891 kernel: audit: type=1300 audit(1734056903.929:1373): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d22f20 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:23.929000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d22f20 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:23.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:24.974451 kernel: audit: type=1327 audit(1734056903.929:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:23.929000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0036ddfe0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:28:23.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:28:45.058711 update_engine[1561]: I1213 02:28:45.058586 1561 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 02:28:45.058711 update_engine[1561]: I1213 02:28:45.058665 1561 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 02:28:45.065521 update_engine[1561]: I1213 02:28:45.065441 1561 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 02:28:45.066482 update_engine[1561]: I1213 02:28:45.066409 1561 omaha_request_params.cc:62] Current group set to lts Dec 13 02:28:45.066791 update_engine[1561]: I1213 02:28:45.066715 1561 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 02:28:45.066791 update_engine[1561]: I1213 02:28:45.066735 1561 update_attempter.cc:643] Scheduling an action processor start. Dec 13 02:28:45.066791 update_engine[1561]: I1213 02:28:45.066771 1561 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 02:28:45.067185 update_engine[1561]: I1213 02:28:45.066836 1561 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 02:28:45.067185 update_engine[1561]: I1213 02:28:45.066987 1561 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 02:28:45.067185 update_engine[1561]: I1213 02:28:45.067003 1561 omaha_request_action.cc:271] Request: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: Dec 13 02:28:45.067185 update_engine[1561]: I1213 02:28:45.067013 1561 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 02:28:45.068296 locksmithd[1602]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 02:28:45.070296 update_engine[1561]: I1213 02:28:45.070215 1561 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 02:28:45.070527 update_engine[1561]: E1213 02:28:45.070464 1561 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 02:28:45.070662 update_engine[1561]: I1213 02:28:45.070626 1561 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 02:28:54.984670 update_engine[1561]: I1213 02:28:54.984586 1561 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 02:28:54.985627 update_engine[1561]: I1213 02:28:54.985077 1561 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 02:28:54.985627 update_engine[1561]: E1213 02:28:54.985281 1561 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 02:28:54.985627 update_engine[1561]: I1213 02:28:54.985472 1561 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Dec 13 02:28:55.647000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:28:55.675566 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:28:55.675608 kernel: audit: type=1400 audit(1734056935.647:1375): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:28:55.647000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018ec0c0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:28:55.891857 kernel: audit: type=1300 audit(1734056935.647:1375): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018ec0c0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:28:55.891904 kernel: audit: type=1327 audit(1734056935.647:1375): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:28:55.647000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:28:57.308244 systemd[1]: Started sshd@9-147.75.203.55:22-92.255.85.188:55734.service. Dec 13 02:28:57.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.55:22-92.255.85.188:55734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:57.398372 kernel: audit: type=1130 audit(1734056937.308:1376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.55:22-92.255.85.188:55734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:57.907000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:28:57.907000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0c1c0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:28:58.127369 kernel: audit: type=1400 audit(1734056937.907:1377): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:28:58.127450 kernel: audit: type=1300 audit(1734056937.907:1377): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0c1c0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:28:58.127466 kernel: audit: type=1327 audit(1734056937.907:1377): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:28:57.907000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:29:00.869213 systemd[1]: Started sshd@10-147.75.203.55:22-103.182.132.154:42624.service. Dec 13 02:29:00.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.55:22-103.182.132.154:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:00.962477 kernel: audit: type=1130 audit(1734056940.868:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.55:22-103.182.132.154:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:02.276484 sshd[6485]: Invalid user xya from 103.182.132.154 port 42624 Dec 13 02:29:02.283339 sshd[6485]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:02.284538 sshd[6485]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:29:02.284626 sshd[6485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.182.132.154 Dec 13 02:29:02.285695 sshd[6485]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:02.285000 audit[6485]: USER_AUTH pid=6485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xya" exe="/usr/sbin/sshd" hostname=103.182.132.154 addr=103.182.132.154 terminal=ssh res=failed' Dec 13 02:29:02.377571 kernel: audit: type=1100 audit(1734056942.285:1379): pid=6485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xya" exe="/usr/sbin/sshd" hostname=103.182.132.154 addr=103.182.132.154 terminal=ssh res=failed' Dec 13 02:29:03.920636 sshd[6485]: Failed password for invalid user xya from 103.182.132.154 port 42624 ssh2 Dec 13 02:29:04.990535 update_engine[1561]: I1213 02:29:04.990430 1561 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 02:29:04.991347 update_engine[1561]: I1213 02:29:04.990912 1561 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 02:29:04.991347 update_engine[1561]: E1213 02:29:04.991117 1561 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 02:29:04.991347 update_engine[1561]: I1213 02:29:04.991317 1561 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Dec 13 02:29:05.822783 sshd[6485]: Received disconnect from 103.182.132.154 port 42624:11: Bye Bye [preauth] Dec 13 02:29:05.822783 sshd[6485]: Disconnected from invalid user xya 103.182.132.154 port 42624 [preauth] Dec 13 02:29:05.825568 systemd[1]: sshd@10-147.75.203.55:22-103.182.132.154:42624.service: Deactivated successfully. Dec 13 02:29:05.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.55:22-103.182.132.154:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:05.921452 kernel: audit: type=1131 audit(1734056945.825:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.55:22-103.182.132.154:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:06.430000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.430000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221be00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:06.644020 kernel: audit: type=1400 audit(1734056946.430:1381): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.644070 kernel: audit: type=1300 audit(1734056946.430:1381): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221be00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:06.644090 kernel: audit: type=1327 audit(1734056946.430:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:06.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:06.737255 kernel: audit: type=1400 audit(1734056946.430:1382): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.430000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.828183 kernel: audit: type=1300 audit(1734056946.430:1382): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00024a960 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:06.430000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00024a960 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:06.949309 kernel: audit: type=1327 audit(1734056946.430:1382): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:06.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:07.043379 kernel: audit: type=1400 audit(1734056946.588:1383): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:07.135452 kernel: audit: type=1300 audit(1734056946.588:1383): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00369f3e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00369f3e0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:07.234709 kernel: audit: type=1327 audit(1734056946.588:1383): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:07.331004 kernel: audit: type=1400 audit(1734056946.588:1384): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ddfc900 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c012d66d60 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004852f20 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ddfc9f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c012a967b0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:29:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:29:08.509566 sshd[6477]: Invalid user postgres from 92.255.85.188 port 55734 Dec 13 02:29:08.778517 sshd[6477]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:08.779773 sshd[6477]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:29:08.779869 sshd[6477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.188 Dec 13 02:29:08.780961 sshd[6477]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:08.780000 audit[6477]: USER_AUTH pid=6477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="postgres" exe="/usr/sbin/sshd" hostname=92.255.85.188 addr=92.255.85.188 terminal=ssh res=failed' Dec 13 02:29:10.907623 sshd[6477]: Failed password for invalid user postgres from 92.255.85.188 port 55734 ssh2 Dec 13 02:29:14.078736 sshd[6477]: Connection closed by invalid user postgres 92.255.85.188 port 55734 [preauth] Dec 13 02:29:14.081348 systemd[1]: sshd@9-147.75.203.55:22-92.255.85.188:55734.service: Deactivated successfully. Dec 13 02:29:14.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.55:22-92.255.85.188:55734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:14.109391 kernel: kauditd_printk_skb: 15 callbacks suppressed Dec 13 02:29:14.109463 kernel: audit: type=1131 audit(1734056954.080:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.55:22-92.255.85.188:55734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:14.991105 update_engine[1561]: I1213 02:29:14.990983 1561 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 02:29:14.991991 update_engine[1561]: I1213 02:29:14.991518 1561 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 02:29:14.991991 update_engine[1561]: E1213 02:29:14.991734 1561 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 02:29:14.991991 update_engine[1561]: I1213 02:29:14.991897 1561 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 02:29:14.991991 update_engine[1561]: I1213 02:29:14.991914 1561 omaha_request_action.cc:621] Omaha request response: Dec 13 02:29:14.992451 update_engine[1561]: E1213 02:29:14.992058 1561 omaha_request_action.cc:640] Omaha request network transfer failed. Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992087 1561 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992096 1561 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992105 1561 update_attempter.cc:306] Processing Done. Dec 13 02:29:14.992451 update_engine[1561]: E1213 02:29:14.992130 1561 update_attempter.cc:619] Update failed. Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992139 1561 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992147 1561 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992157 1561 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992313 1561 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992400 1561 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992421 1561 omaha_request_action.cc:271] Request: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: Dec 13 02:29:14.992451 update_engine[1561]: I1213 02:29:14.992437 1561 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.992843 1561 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 02:29:14.994154 update_engine[1561]: E1213 02:29:14.993017 1561 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993152 1561 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993167 1561 omaha_request_action.cc:621] Omaha request response: Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993178 1561 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993186 1561 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993193 1561 update_attempter.cc:306] Processing Done. Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993201 1561 update_attempter.cc:310] Error event sent. Dec 13 02:29:14.994154 update_engine[1561]: I1213 02:29:14.993223 1561 update_check_scheduler.cc:74] Next update check in 48m9s Dec 13 02:29:14.995008 locksmithd[1602]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Dec 13 02:29:14.995008 locksmithd[1602]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Dec 13 02:29:23.928000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:23.928000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00069f040 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:24.143148 kernel: audit: type=1400 audit(1734056963.928:1391): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:24.143222 kernel: audit: type=1300 audit(1734056963.928:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00069f040 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:24.143243 kernel: audit: type=1327 audit(1734056963.928:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:23.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:24.236544 kernel: audit: type=1400 audit(1734056963.928:1392): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:23.928000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:24.326608 kernel: audit: type=1300 audit(1734056963.928:1392): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d233a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:23.928000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d233a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:24.447047 kernel: audit: type=1327 audit(1734056963.928:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:23.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:24.540301 kernel: audit: type=1400 audit(1734056963.929:1393): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:23.929000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:24.630371 kernel: audit: type=1300 audit(1734056963.929:1393): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00069fb00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:23.929000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00069fb00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:24.750829 kernel: audit: type=1327 audit(1734056963.929:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:23.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:24.843984 kernel: audit: type=1400 audit(1734056963.929:1394): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:23.929000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:29:23.929000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003a16740 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:29:23.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:29:45.893223 systemd[1]: Started sshd@11-147.75.203.55:22-121.201.125.75:58302.service. Dec 13 02:29:45.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.55:22-121.201.125.75:58302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:45.920537 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:29:45.920605 kernel: audit: type=1130 audit(1734056985.891:1395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.55:22-121.201.125.75:58302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:46.901256 sshd[6581]: Invalid user cdg from 121.201.125.75 port 58302 Dec 13 02:29:46.902949 sshd[6581]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:46.903331 sshd[6581]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:29:46.903350 sshd[6581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.125.75 Dec 13 02:29:46.903654 sshd[6581]: pam_faillock(sshd:auth): User unknown Dec 13 02:29:46.902000 audit[6581]: USER_AUTH pid=6581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cdg" exe="/usr/sbin/sshd" hostname=121.201.125.75 addr=121.201.125.75 terminal=ssh res=failed' Dec 13 02:29:46.993573 kernel: audit: type=1100 audit(1734056986.902:1396): pid=6581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cdg" exe="/usr/sbin/sshd" hostname=121.201.125.75 addr=121.201.125.75 terminal=ssh res=failed' Dec 13 02:29:49.246649 sshd[6581]: Failed password for invalid user cdg from 121.201.125.75 port 58302 ssh2 Dec 13 02:29:50.007650 sshd[6581]: Received disconnect from 121.201.125.75 port 58302:11: Bye Bye [preauth] Dec 13 02:29:50.007650 sshd[6581]: Disconnected from invalid user cdg 121.201.125.75 port 58302 [preauth] Dec 13 02:29:50.010253 systemd[1]: sshd@11-147.75.203.55:22-121.201.125.75:58302.service: Deactivated successfully. Dec 13 02:29:50.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.55:22-121.201.125.75:58302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:50.101445 kernel: audit: type=1131 audit(1734056990.009:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.55:22-121.201.125.75:58302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:29:55.647000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:29:55.647000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001938e20 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:29:55.871666 kernel: audit: type=1400 audit(1734056995.647:1398): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:29:55.871711 kernel: audit: type=1300 audit(1734056995.647:1398): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001938e20 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:29:55.871729 kernel: audit: type=1327 audit(1734056995.647:1398): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:29:55.647000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:29:57.908000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:29:57.908000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0c1e0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:29:58.126686 kernel: audit: type=1400 audit(1734056997.908:1399): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:29:58.126731 kernel: audit: type=1300 audit(1734056997.908:1399): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e0c1e0 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:29:58.126748 kernel: audit: type=1327 audit(1734056997.908:1399): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:29:57.908000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:30:06.431000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.431000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003008cf0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:06.647295 kernel: audit: type=1400 audit(1734057006.431:1400): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.647404 kernel: audit: type=1300 audit(1734057006.431:1400): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003008cf0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:06.647438 kernel: audit: type=1327 audit(1734057006.431:1400): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:06.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:06.740195 kernel: audit: type=1400 audit(1734057006.431:1401): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.431000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.829790 kernel: audit: type=1300 audit(1734057006.431:1401): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ea280 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:06.431000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ea280 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:06.949884 kernel: audit: type=1327 audit(1734057006.431:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:06.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:07.043752 kernel: audit: type=1400 audit(1734057006.588:1402): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:07.134215 kernel: audit: type=1300 audit(1734057006.588:1402): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004963760 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004963760 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:07.233129 kernel: audit: type=1327 audit(1734057006.588:1402): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:07.326936 kernel: audit: type=1400 audit(1734057006.588:1403): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0070ba150 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0070ba180 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00777bf80 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0049637a0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008a3cb10 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:30:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:30:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.958453 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:30:23.958556 kernel: audit: type=1400 audit(1734057023.930:1408): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028d3b00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:24.171024 kernel: audit: type=1300 audit(1734057023.930:1408): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028d3b00 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:24.171096 kernel: audit: type=1327 audit(1734057023.930:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:24.264203 kernel: audit: type=1400 audit(1734057023.930:1409): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:24.354145 kernel: audit: type=1300 audit(1734057023.930:1409): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003868240 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003868240 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:24.474689 kernel: audit: type=1327 audit(1734057023.930:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:24.567980 kernel: audit: type=1400 audit(1734057023.931:1410): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:24.657960 kernel: audit: type=1300 audit(1734057023.931:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d23a40 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d23a40 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:24.778569 kernel: audit: type=1327 audit(1734057023.931:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:24.871840 kernel: audit: type=1400 audit(1734057023.931:1411): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:30:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029eb760 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:30:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:30:34.740020 systemd[1]: Started sshd@12-147.75.203.55:22-45.206.58.170:51178.service. Dec 13 02:30:34.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.55:22-45.206.58.170:51178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:34.767369 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:30:34.767438 kernel: audit: type=1130 audit(1734057034.739:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.55:22-45.206.58.170:51178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.519411 sshd[6705]: Invalid user bpo from 45.206.58.170 port 51178 Dec 13 02:30:35.525954 sshd[6705]: pam_faillock(sshd:auth): User unknown Dec 13 02:30:35.527177 sshd[6705]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:30:35.527273 sshd[6705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.206.58.170 Dec 13 02:30:35.528274 sshd[6705]: pam_faillock(sshd:auth): User unknown Dec 13 02:30:35.528000 audit[6705]: USER_AUTH pid=6705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bpo" exe="/usr/sbin/sshd" hostname=45.206.58.170 addr=45.206.58.170 terminal=ssh res=failed' Dec 13 02:30:35.617561 kernel: audit: type=1100 audit(1734057035.528:1413): pid=6705 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bpo" exe="/usr/sbin/sshd" hostname=45.206.58.170 addr=45.206.58.170 terminal=ssh res=failed' Dec 13 02:30:38.267423 sshd[6705]: Failed password for invalid user bpo from 45.206.58.170 port 51178 ssh2 Dec 13 02:30:38.834549 sshd[6705]: Received disconnect from 45.206.58.170 port 51178:11: Bye Bye [preauth] Dec 13 02:30:38.834549 sshd[6705]: Disconnected from invalid user bpo 45.206.58.170 port 51178 [preauth] Dec 13 02:30:38.837193 systemd[1]: sshd@12-147.75.203.55:22-45.206.58.170:51178.service: Deactivated successfully. Dec 13 02:30:38.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.55:22-45.206.58.170:51178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:38.928371 kernel: audit: type=1131 audit(1734057038.837:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.55:22-45.206.58.170:51178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.648000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:30:55.648000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016945c0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:30:55.869359 kernel: audit: type=1400 audit(1734057055.648:1415): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:30:55.869404 kernel: audit: type=1300 audit(1734057055.648:1415): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016945c0 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:30:55.869424 kernel: audit: type=1327 audit(1734057055.648:1415): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:30:55.648000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:30:57.909000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:30:57.909000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001212020 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:30:58.010371 kernel: audit: type=1400 audit(1734057057.909:1416): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:30:58.010398 kernel: audit: type=1300 audit(1734057057.909:1416): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001212020 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:30:57.909000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:30:58.226118 kernel: audit: type=1327 audit(1734057057.909:1416): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:31:06.430000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.430000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035a33e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:06.647928 kernel: audit: type=1400 audit(1734057066.430:1417): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.647990 kernel: audit: type=1300 audit(1734057066.430:1417): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035a33e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:06.648006 kernel: audit: type=1327 audit(1734057066.430:1417): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:06.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:06.741025 kernel: audit: type=1400 audit(1734057066.430:1418): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.430000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.831949 kernel: audit: type=1300 audit(1734057066.430:1418): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008183c0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:06.430000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008183c0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:06.952221 kernel: audit: type=1327 audit(1734057066.430:1418): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:06.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:07.046149 kernel: audit: type=1400 audit(1734057066.588:1419): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:07.138155 kernel: audit: type=1300 audit(1734057066.588:1419): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008194ff0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008194ff0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:07.237144 kernel: audit: type=1327 audit(1734057066.588:1419): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:07.331039 kernel: audit: type=1400 audit(1734057066.588:1420): avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009690a50 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f7374c0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00451a380 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00902cae0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:06.588000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:06.588000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009690ae0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:31:06.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:31:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.959334 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:31:23.959419 kernel: audit: type=1400 audit(1734057083.930:1425): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035169a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:24.171561 kernel: audit: type=1300 audit(1734057083.930:1425): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035169a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:24.171637 kernel: audit: type=1327 audit(1734057083.930:1425): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:24.264804 kernel: audit: type=1400 audit(1734057083.930:1426): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:24.354767 kernel: audit: type=1300 audit(1734057083.930:1426): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0034d27a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0034d27a0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:24.475346 kernel: audit: type=1327 audit(1734057083.930:1426): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:24.568649 kernel: audit: type=1400 audit(1734057083.930:1427): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:24.658610 kernel: audit: type=1300 audit(1734057083.930:1427): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028d3b20 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028d3b20 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:24.779167 kernel: audit: type=1327 audit(1734057083.930:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:24.872450 kernel: audit: type=1400 audit(1734057083.930:1428): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.930000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:23.930000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0034d27c0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:31:23.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:55.649000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:31:55.694745 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:31:55.694870 kernel: audit: type=1400 audit(1734057115.649:1429): avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:31:55.649000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018ecd00 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:31:55.910841 kernel: audit: type=1300 audit(1734057115.649:1429): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018ecd00 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:31:55.910916 kernel: audit: type=1327 audit(1734057115.649:1429): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:31:55.649000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:31:57.909000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:31:57.909000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c3c060 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:31:58.128203 kernel: audit: type=1400 audit(1734057117.909:1430): avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:31:58.128329 kernel: audit: type=1300 audit(1734057117.909:1430): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c3c060 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:31:58.128370 kernel: audit: type=1327 audit(1734057117.909:1430): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:31:57.909000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:32:06.379454 systemd[1]: Started sshd@13-147.75.203.55:22-139.178.68.195:52546.service. Dec 13 02:32:06.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.55:22-139.178.68.195:52546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:06.431000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.561502 kernel: audit: type=1130 audit(1734057126.378:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.55:22-139.178.68.195:52546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:06.561552 kernel: audit: type=1400 audit(1734057126.431:1432): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.561570 kernel: audit: type=1300 audit(1734057126.431:1432): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00145f5f0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:06.431000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00145f5f0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:06.589626 sshd[6901]: Accepted publickey for core from 139.178.68.195 port 52546 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:06.591173 sshd[6901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:06.593677 systemd-logind[1559]: New session 12 of user core. Dec 13 02:32:06.594405 systemd[1]: Started session-12.scope. Dec 13 02:32:06.677803 sshd[6901]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:06.679107 systemd[1]: sshd@13-147.75.203.55:22-139.178.68.195:52546.service: Deactivated successfully. Dec 13 02:32:06.679594 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:32:06.679952 systemd-logind[1559]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:32:06.680342 systemd-logind[1559]: Removed session 12. Dec 13 02:32:06.681393 kernel: audit: type=1327 audit(1734057126.431:1432): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:06.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:06.431000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.864110 kernel: audit: type=1400 audit(1734057126.431:1433): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.431000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036dc0e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:06.984610 kernel: audit: type=1300 audit(1734057126.431:1433): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036dc0e0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:06.984644 kernel: audit: type=1327 audit(1734057126.431:1433): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:06.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:07.077549 kernel: audit: type=1101 audit(1734057126.588:1434): pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.588000 audit[6901]: USER_ACCT pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:07.169946 kernel: audit: type=1103 audit(1734057126.589:1435): pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.589000 audit[6901]: CRED_ACQ pid=6901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:07.261719 kernel: audit: type=1006 audit(1734057126.589:1436): pid=6901 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 02:32:06.589000 audit[6901]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe40b4ad20 a2=3 a3=0 items=0 ppid=1 pid=6901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ed6b8f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0104bfd20 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010229d60 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0081a0630 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0080226f0 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.589000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:06.589000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ed6b920 a2=fc6 a3=0 items=0 ppid=2292 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c844 key=(null) Dec 13 02:32:06.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 02:32:06.595000 audit[6901]: USER_START pid=6901 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.596000 audit[6903]: CRED_ACQ pid=6903 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.677000 audit[6901]: USER_END pid=6901 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.677000 audit[6901]: CRED_DISP pid=6901 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:06.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.55:22-139.178.68.195:52546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:11.690974 systemd[1]: Started sshd@14-147.75.203.55:22-139.178.68.195:52554.service. Dec 13 02:32:11.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.55:22-139.178.68.195:52554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:11.735055 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 02:32:11.735162 kernel: audit: type=1130 audit(1734057131.690:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.55:22-139.178.68.195:52554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:11.851000 audit[6955]: USER_ACCT pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.852815 sshd[6955]: Accepted publickey for core from 139.178.68.195 port 52554 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:11.854010 sshd[6955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:11.856562 systemd-logind[1559]: New session 13 of user core. Dec 13 02:32:11.857114 systemd[1]: Started session-13.scope. Dec 13 02:32:11.936242 sshd[6955]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:11.937716 systemd[1]: sshd@14-147.75.203.55:22-139.178.68.195:52554.service: Deactivated successfully. Dec 13 02:32:11.938159 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:32:11.938528 systemd-logind[1559]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:32:11.939063 systemd-logind[1559]: Removed session 13. Dec 13 02:32:11.852000 audit[6955]: CRED_ACQ pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.037021 kernel: audit: type=1101 audit(1734057131.851:1449): pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.037064 kernel: audit: type=1103 audit(1734057131.852:1450): pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.037082 kernel: audit: type=1006 audit(1734057131.852:1451): pid=6955 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 02:32:12.096202 kernel: audit: type=1300 audit(1734057131.852:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5aabe50 a2=3 a3=0 items=0 ppid=1 pid=6955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:11.852000 audit[6955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5aabe50 a2=3 a3=0 items=0 ppid=1 pid=6955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:11.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:12.220079 kernel: audit: type=1327 audit(1734057131.852:1451): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:12.220118 kernel: audit: type=1105 audit(1734057131.857:1452): pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.857000 audit[6955]: USER_START pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.315724 kernel: audit: type=1103 audit(1734057131.858:1453): pid=6957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.858000 audit[6957]: CRED_ACQ pid=6957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.405326 kernel: audit: type=1106 audit(1734057131.935:1454): pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.935000 audit[6955]: USER_END pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:12.501157 kernel: audit: type=1104 audit(1734057131.935:1455): pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.935000 audit[6955]: CRED_DISP pid=6955 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:11.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.55:22-139.178.68.195:52554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:16.948303 systemd[1]: Started sshd@15-147.75.203.55:22-139.178.68.195:48514.service. Dec 13 02:32:16.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.55:22-139.178.68.195:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:16.976033 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:32:16.976134 kernel: audit: type=1130 audit(1734057136.947:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.55:22-139.178.68.195:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.094000 audit[6981]: USER_ACCT pid=6981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.094861 sshd[6981]: Accepted publickey for core from 139.178.68.195 port 48514 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:17.096030 sshd[6981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:17.098568 systemd-logind[1559]: New session 14 of user core. Dec 13 02:32:17.098947 systemd[1]: Started session-14.scope. Dec 13 02:32:17.175352 sshd[6981]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:17.177098 systemd[1]: sshd@15-147.75.203.55:22-139.178.68.195:48514.service: Deactivated successfully. Dec 13 02:32:17.177443 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:32:17.177807 systemd-logind[1559]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:32:17.178362 systemd[1]: Started sshd@16-147.75.203.55:22-139.178.68.195:48522.service. Dec 13 02:32:17.178787 systemd-logind[1559]: Removed session 14. Dec 13 02:32:17.094000 audit[6981]: CRED_ACQ pid=6981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.276970 kernel: audit: type=1101 audit(1734057137.094:1458): pid=6981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.277011 kernel: audit: type=1103 audit(1734057137.094:1459): pid=6981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.277030 kernel: audit: type=1006 audit(1734057137.094:1460): pid=6981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 02:32:17.335541 kernel: audit: type=1300 audit(1734057137.094:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50f59040 a2=3 a3=0 items=0 ppid=1 pid=6981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:17.094000 audit[6981]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50f59040 a2=3 a3=0 items=0 ppid=1 pid=6981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:17.363716 sshd[7006]: Accepted publickey for core from 139.178.68.195 port 48522 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:17.364671 sshd[7006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:17.367005 systemd-logind[1559]: New session 15 of user core. Dec 13 02:32:17.367458 systemd[1]: Started session-15.scope. Dec 13 02:32:17.427497 kernel: audit: type=1327 audit(1734057137.094:1460): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:17.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:17.099000 audit[6981]: USER_START pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.552446 kernel: audit: type=1105 audit(1734057137.099:1461): pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.552499 kernel: audit: type=1103 audit(1734057137.100:1462): pid=6983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.100000 audit[6983]: CRED_ACQ pid=6983 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.553963 sshd[7006]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:17.555794 systemd[1]: sshd@16-147.75.203.55:22-139.178.68.195:48522.service: Deactivated successfully. Dec 13 02:32:17.556186 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:32:17.556642 systemd-logind[1559]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:32:17.557252 systemd[1]: Started sshd@17-147.75.203.55:22-139.178.68.195:48532.service. Dec 13 02:32:17.557763 systemd-logind[1559]: Removed session 15. Dec 13 02:32:17.174000 audit[6981]: USER_END pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.642373 kernel: audit: type=1106 audit(1734057137.174:1463): pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.174000 audit[6981]: CRED_DISP pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.765586 sshd[7029]: Accepted publickey for core from 139.178.68.195 port 48532 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:17.767129 sshd[7029]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:17.770057 systemd-logind[1559]: New session 16 of user core. Dec 13 02:32:17.771458 systemd[1]: Started session-16.scope. Dec 13 02:32:17.826437 kernel: audit: type=1104 audit(1734057137.174:1464): pid=6981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.55:22-139.178.68.195:48514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.55:22-139.178.68.195:48522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.362000 audit[7006]: USER_ACCT pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.363000 audit[7006]: CRED_ACQ pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.363000 audit[7006]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd09951f0 a2=3 a3=0 items=0 ppid=1 pid=7006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:17.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:17.368000 audit[7006]: USER_START pid=7006 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.368000 audit[7008]: CRED_ACQ pid=7008 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.553000 audit[7006]: USER_END pid=7006 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.553000 audit[7006]: CRED_DISP pid=7006 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.55:22-139.178.68.195:48522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.55:22-139.178.68.195:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.764000 audit[7029]: USER_ACCT pid=7029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.765000 audit[7029]: CRED_ACQ pid=7029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.765000 audit[7029]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8adb8e0 a2=3 a3=0 items=0 ppid=1 pid=7029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:17.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:17.773000 audit[7029]: USER_START pid=7029 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.774000 audit[7031]: CRED_ACQ pid=7031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.850439 sshd[7029]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:17.849000 audit[7029]: USER_END pid=7029 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.849000 audit[7029]: CRED_DISP pid=7029 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:17.851948 systemd[1]: sshd@17-147.75.203.55:22-139.178.68.195:48532.service: Deactivated successfully. Dec 13 02:32:17.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.55:22-139.178.68.195:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:17.852397 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:32:17.852746 systemd-logind[1559]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:32:17.853171 systemd-logind[1559]: Removed session 16. Dec 13 02:32:22.234649 systemd[1]: Started sshd@18-147.75.203.55:22-35.246.45.157:56536.service. Dec 13 02:32:22.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.55:22-35.246.45.157:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:22.261811 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:32:22.261862 kernel: audit: type=1130 audit(1734057142.233:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.55:22-35.246.45.157:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:22.860199 systemd[1]: Started sshd@19-147.75.203.55:22-139.178.68.195:48536.service. Dec 13 02:32:22.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.55:22-139.178.68.195:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:22.938100 sshd[7055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.246.45.157 user=root Dec 13 02:32:22.936000 audit[7055]: USER_AUTH pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=35.246.45.157 addr=35.246.45.157 terminal=ssh res=failed' Dec 13 02:32:23.040126 kernel: audit: type=1130 audit(1734057142.858:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.55:22-139.178.68.195:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:23.040205 kernel: audit: type=1100 audit(1734057142.936:1486): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=35.246.45.157 addr=35.246.45.157 terminal=ssh res=failed' Dec 13 02:32:23.068000 audit[7058]: USER_ACCT pid=7058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.068893 sshd[7058]: Accepted publickey for core from 139.178.68.195 port 48536 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:23.069697 sshd[7058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:23.072117 systemd-logind[1559]: New session 17 of user core. Dec 13 02:32:23.072565 systemd[1]: Started session-17.scope. Dec 13 02:32:23.150316 sshd[7058]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:23.151790 systemd[1]: sshd@19-147.75.203.55:22-139.178.68.195:48536.service: Deactivated successfully. Dec 13 02:32:23.152248 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:32:23.152624 systemd-logind[1559]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:32:23.153121 systemd-logind[1559]: Removed session 17. Dec 13 02:32:23.068000 audit[7058]: CRED_ACQ pid=7058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.251443 kernel: audit: type=1101 audit(1734057143.068:1487): pid=7058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.251487 kernel: audit: type=1103 audit(1734057143.068:1488): pid=7058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.251509 kernel: audit: type=1006 audit(1734057143.068:1489): pid=7058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:32:23.310039 kernel: audit: type=1300 audit(1734057143.068:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea0a9f30 a2=3 a3=0 items=0 ppid=1 pid=7058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:23.068000 audit[7058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea0a9f30 a2=3 a3=0 items=0 ppid=1 pid=7058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:23.402512 kernel: audit: type=1327 audit(1734057143.068:1489): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:23.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:23.433353 kernel: audit: type=1105 audit(1734057143.073:1490): pid=7058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.073000 audit[7058]: USER_START pid=7058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.528825 kernel: audit: type=1103 audit(1734057143.074:1491): pid=7060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.074000 audit[7060]: CRED_ACQ pid=7060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.149000 audit[7058]: USER_END pid=7058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.149000 audit[7058]: CRED_DISP pid=7058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:23.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.55:22-139.178.68.195:48536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003868fc0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00117e140 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00267ede0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:23.931000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:23.931000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003868fe0 a2=fc6 a3=0 items=0 ppid=2320 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c994 key=(null) Dec 13 02:32:23.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:24.698726 sshd[7055]: Failed password for root from 35.246.45.157 port 56536 ssh2 Dec 13 02:32:25.226362 sshd[7055]: Connection closed by authenticating user root 35.246.45.157 port 56536 [preauth] Dec 13 02:32:25.228995 systemd[1]: sshd@18-147.75.203.55:22-35.246.45.157:56536.service: Deactivated successfully. Dec 13 02:32:25.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.55:22-35.246.45.157:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.160023 systemd[1]: Started sshd@20-147.75.203.55:22-139.178.68.195:37080.service. Dec 13 02:32:28.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.55:22-139.178.68.195:37080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.187052 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 02:32:28.187094 kernel: audit: type=1130 audit(1734057148.158:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.55:22-139.178.68.195:37080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.304000 audit[7115]: USER_ACCT pid=7115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.305813 sshd[7115]: Accepted publickey for core from 139.178.68.195 port 37080 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:28.306546 sshd[7115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:28.309035 systemd-logind[1559]: New session 18 of user core. Dec 13 02:32:28.309728 systemd[1]: Started session-18.scope. Dec 13 02:32:28.387664 sshd[7115]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:28.389030 systemd[1]: sshd@20-147.75.203.55:22-139.178.68.195:37080.service: Deactivated successfully. Dec 13 02:32:28.389512 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:32:28.389846 systemd-logind[1559]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:32:28.390248 systemd-logind[1559]: Removed session 18. Dec 13 02:32:28.304000 audit[7115]: CRED_ACQ pid=7115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.487458 kernel: audit: type=1101 audit(1734057148.304:1501): pid=7115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.487498 kernel: audit: type=1103 audit(1734057148.304:1502): pid=7115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.487516 kernel: audit: type=1006 audit(1734057148.304:1503): pid=7115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:32:28.546050 kernel: audit: type=1300 audit(1734057148.304:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdab3eef20 a2=3 a3=0 items=0 ppid=1 pid=7115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.304000 audit[7115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdab3eef20 a2=3 a3=0 items=0 ppid=1 pid=7115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.637997 kernel: audit: type=1327 audit(1734057148.304:1503): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:28.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:28.310000 audit[7115]: USER_START pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.762998 kernel: audit: type=1105 audit(1734057148.310:1504): pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.763032 kernel: audit: type=1103 audit(1734057148.311:1505): pid=7117 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.311000 audit[7117]: CRED_ACQ pid=7117 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.852130 kernel: audit: type=1106 audit(1734057148.386:1506): pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.386000 audit[7115]: USER_END pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.947560 kernel: audit: type=1104 audit(1734057148.386:1507): pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.386000 audit[7115]: CRED_DISP pid=7115 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:28.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.55:22-139.178.68.195:37080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:32.316523 systemd[1]: Started sshd@21-147.75.203.55:22-119.202.128.28:60748.service. Dec 13 02:32:32.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.55:22-119.202.128.28:60748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:33.079056 sshd[7162]: Invalid user zrq from 119.202.128.28 port 60748 Dec 13 02:32:33.085742 sshd[7162]: pam_faillock(sshd:auth): User unknown Dec 13 02:32:33.086954 sshd[7162]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:32:33.087053 sshd[7162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.128.28 Dec 13 02:32:33.088073 sshd[7162]: pam_faillock(sshd:auth): User unknown Dec 13 02:32:33.086000 audit[7162]: USER_AUTH pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zrq" exe="/usr/sbin/sshd" hostname=119.202.128.28 addr=119.202.128.28 terminal=ssh res=failed' Dec 13 02:32:33.397904 systemd[1]: Started sshd@22-147.75.203.55:22-139.178.68.195:37090.service. Dec 13 02:32:33.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.55:22-139.178.68.195:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:33.425140 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 02:32:33.425223 kernel: audit: type=1130 audit(1734057153.396:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.55:22-139.178.68.195:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:33.453638 sshd[7165]: Accepted publickey for core from 139.178.68.195 port 37090 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:33.455758 sshd[7165]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:33.458181 systemd-logind[1559]: New session 19 of user core. Dec 13 02:32:33.459034 systemd[1]: Started session-19.scope. Dec 13 02:32:33.452000 audit[7165]: USER_ACCT pid=7165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.537687 sshd[7165]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:33.539143 systemd[1]: sshd@22-147.75.203.55:22-139.178.68.195:37090.service: Deactivated successfully. Dec 13 02:32:33.539656 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:32:33.539979 systemd-logind[1559]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:32:33.540422 systemd-logind[1559]: Removed session 19. Dec 13 02:32:33.606809 kernel: audit: type=1101 audit(1734057153.452:1512): pid=7165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.606844 kernel: audit: type=1103 audit(1734057153.454:1513): pid=7165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.454000 audit[7165]: CRED_ACQ pid=7165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.696448 kernel: audit: type=1006 audit(1734057153.454:1514): pid=7165 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 02:32:33.754520 kernel: audit: type=1300 audit(1734057153.454:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff937ecdb0 a2=3 a3=0 items=0 ppid=1 pid=7165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.454000 audit[7165]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff937ecdb0 a2=3 a3=0 items=0 ppid=1 pid=7165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.846322 kernel: audit: type=1327 audit(1734057153.454:1514): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:33.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:33.876820 kernel: audit: type=1105 audit(1734057153.459:1515): pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.459000 audit[7165]: USER_START pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.971309 kernel: audit: type=1103 audit(1734057153.460:1516): pid=7167 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.460000 audit[7167]: CRED_ACQ pid=7167 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:34.060448 kernel: audit: type=1106 audit(1734057153.537:1517): pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.537000 audit[7165]: USER_END pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:34.155991 kernel: audit: type=1104 audit(1734057153.537:1518): pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.537000 audit[7165]: CRED_DISP pid=7165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:33.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.55:22-139.178.68.195:37090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:34.692653 sshd[7162]: Failed password for invalid user zrq from 119.202.128.28 port 60748 ssh2 Dec 13 02:32:35.874603 sshd[7162]: Received disconnect from 119.202.128.28 port 60748:11: Bye Bye [preauth] Dec 13 02:32:35.874603 sshd[7162]: Disconnected from invalid user zrq 119.202.128.28 port 60748 [preauth] Dec 13 02:32:35.877238 systemd[1]: sshd@21-147.75.203.55:22-119.202.128.28:60748.service: Deactivated successfully. Dec 13 02:32:35.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.55:22-119.202.128.28:60748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.547423 systemd[1]: Started sshd@23-147.75.203.55:22-139.178.68.195:57850.service. Dec 13 02:32:38.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.55:22-139.178.68.195:57850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.574352 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:32:38.574412 kernel: audit: type=1130 audit(1734057158.546:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.55:22-139.178.68.195:57850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.692000 audit[7211]: USER_ACCT pid=7211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.692890 sshd[7211]: Accepted publickey for core from 139.178.68.195 port 57850 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:38.694449 sshd[7211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:38.696899 systemd-logind[1559]: New session 20 of user core. Dec 13 02:32:38.697386 systemd[1]: Started session-20.scope. Dec 13 02:32:38.775676 sshd[7211]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:38.777533 systemd[1]: sshd@23-147.75.203.55:22-139.178.68.195:57850.service: Deactivated successfully. Dec 13 02:32:38.777900 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:32:38.778184 systemd-logind[1559]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:32:38.778777 systemd[1]: Started sshd@24-147.75.203.55:22-139.178.68.195:57852.service. Dec 13 02:32:38.779230 systemd-logind[1559]: Removed session 20. Dec 13 02:32:38.692000 audit[7211]: CRED_ACQ pid=7211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.874668 kernel: audit: type=1101 audit(1734057158.692:1522): pid=7211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.874738 kernel: audit: type=1103 audit(1734057158.692:1523): pid=7211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.874757 kernel: audit: type=1006 audit(1734057158.692:1524): pid=7211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 02:32:38.692000 audit[7211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b984280 a2=3 a3=0 items=0 ppid=1 pid=7211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.961725 sshd[7236]: Accepted publickey for core from 139.178.68.195 port 57852 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:38.964186 sshd[7236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:38.966780 systemd-logind[1559]: New session 21 of user core. Dec 13 02:32:38.967331 systemd[1]: Started session-21.scope. Dec 13 02:32:39.025309 kernel: audit: type=1300 audit(1734057158.692:1524): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b984280 a2=3 a3=0 items=0 ppid=1 pid=7211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.025380 kernel: audit: type=1327 audit(1734057158.692:1524): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:38.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:39.055851 kernel: audit: type=1105 audit(1734057158.698:1525): pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.698000 audit[7211]: USER_START pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.058387 sshd[7236]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:39.060460 systemd[1]: sshd@24-147.75.203.55:22-139.178.68.195:57852.service: Deactivated successfully. Dec 13 02:32:39.060855 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:32:39.061207 systemd-logind[1559]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:32:39.061837 systemd[1]: Started sshd@25-147.75.203.55:22-139.178.68.195:57866.service. Dec 13 02:32:39.062324 systemd-logind[1559]: Removed session 21. Dec 13 02:32:39.150421 kernel: audit: type=1103 audit(1734057158.698:1526): pid=7213 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.698000 audit[7213]: CRED_ACQ pid=7213 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.775000 audit[7211]: USER_END pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.267825 sshd[7258]: Accepted publickey for core from 139.178.68.195 port 57866 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:39.269684 sshd[7258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:39.272414 systemd-logind[1559]: New session 22 of user core. Dec 13 02:32:39.273105 systemd[1]: Started session-22.scope. Dec 13 02:32:39.335132 kernel: audit: type=1106 audit(1734057158.775:1527): pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.335207 kernel: audit: type=1104 audit(1734057158.775:1528): pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.775000 audit[7211]: CRED_DISP pid=7211 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.55:22-139.178.68.195:57850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.55:22-139.178.68.195:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.960000 audit[7236]: USER_ACCT pid=7236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.962000 audit[7236]: CRED_ACQ pid=7236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.962000 audit[7236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd89c3b30 a2=3 a3=0 items=0 ppid=1 pid=7236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:38.968000 audit[7236]: USER_START pid=7236 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:38.969000 audit[7238]: CRED_ACQ pid=7238 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.057000 audit[7236]: USER_END pid=7236 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.057000 audit[7236]: CRED_DISP pid=7236 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.55:22-139.178.68.195:57852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:39.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.55:22-139.178.68.195:57866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:39.266000 audit[7258]: USER_ACCT pid=7258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.268000 audit[7258]: CRED_ACQ pid=7258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.268000 audit[7258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe04da340 a2=3 a3=0 items=0 ppid=1 pid=7258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:39.273000 audit[7258]: USER_START pid=7258 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:39.274000 audit[7260]: CRED_ACQ pid=7260 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.437000 audit[7284]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=7284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.437000 audit[7284]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd478eb920 a2=0 a3=7ffd478eb90c items=0 ppid=2913 pid=7284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.447691 sshd[7258]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:40.446000 audit[7258]: USER_END pid=7258 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.446000 audit[7258]: CRED_DISP pid=7258 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.449552 systemd[1]: sshd@25-147.75.203.55:22-139.178.68.195:57866.service: Deactivated successfully. Dec 13 02:32:40.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.55:22-139.178.68.195:57866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:40.449954 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:32:40.450380 systemd-logind[1559]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:32:40.451444 systemd[1]: Started sshd@26-147.75.203.55:22-139.178.68.195:57874.service. Dec 13 02:32:40.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.55:22-139.178.68.195:57874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:40.451859 systemd-logind[1559]: Removed session 22. Dec 13 02:32:40.450000 audit[7284]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=7284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.450000 audit[7284]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd478eb920 a2=0 a3=0 items=0 ppid=2913 pid=7284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.463000 audit[7291]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=7291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.463000 audit[7291]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff8c03a960 a2=0 a3=7fff8c03a94c items=0 ppid=2913 pid=7291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.484000 audit[7288]: USER_ACCT pid=7288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.486134 sshd[7288]: Accepted publickey for core from 139.178.68.195 port 57874 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:40.485000 audit[7291]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=7291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.485000 audit[7291]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff8c03a960 a2=0 a3=0 items=0 ppid=2913 pid=7291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.486000 audit[7288]: CRED_ACQ pid=7288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.487000 audit[7288]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff018daa20 a2=3 a3=0 items=0 ppid=1 pid=7288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:40.489338 sshd[7288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:40.499622 systemd-logind[1559]: New session 23 of user core. Dec 13 02:32:40.502116 systemd[1]: Started session-23.scope. Dec 13 02:32:40.514000 audit[7288]: USER_START pid=7288 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.517000 audit[7294]: CRED_ACQ pid=7294 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.692421 sshd[7288]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:40.691000 audit[7288]: USER_END pid=7288 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.691000 audit[7288]: CRED_DISP pid=7288 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.694335 systemd[1]: sshd@26-147.75.203.55:22-139.178.68.195:57874.service: Deactivated successfully. Dec 13 02:32:40.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.55:22-139.178.68.195:57874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:40.694704 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:32:40.695017 systemd-logind[1559]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:32:40.695662 systemd[1]: Started sshd@27-147.75.203.55:22-139.178.68.195:57882.service. Dec 13 02:32:40.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.203.55:22-139.178.68.195:57882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:40.696070 systemd-logind[1559]: Removed session 23. Dec 13 02:32:40.729000 audit[7315]: USER_ACCT pid=7315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.729944 sshd[7315]: Accepted publickey for core from 139.178.68.195 port 57882 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:40.729000 audit[7315]: CRED_ACQ pid=7315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.729000 audit[7315]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe038b3820 a2=3 a3=0 items=0 ppid=1 pid=7315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.729000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:40.730853 sshd[7315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:40.733813 systemd-logind[1559]: New session 24 of user core. Dec 13 02:32:40.734364 systemd[1]: Started session-24.scope. Dec 13 02:32:40.735000 audit[7315]: USER_START pid=7315 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.736000 audit[7317]: CRED_ACQ pid=7317 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.856022 sshd[7315]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:40.855000 audit[7315]: USER_END pid=7315 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.855000 audit[7315]: CRED_DISP pid=7315 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:40.857418 systemd[1]: sshd@27-147.75.203.55:22-139.178.68.195:57882.service: Deactivated successfully. Dec 13 02:32:40.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.203.55:22-139.178.68.195:57882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:40.857868 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:32:40.858213 systemd-logind[1559]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:32:40.858857 systemd-logind[1559]: Removed session 24. Dec 13 02:32:44.960000 audit[7342]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=7342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:44.989322 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 02:32:44.989403 kernel: audit: type=1325 audit(1734057164.960:1570): table=filter:122 family=2 entries=20 op=nft_register_rule pid=7342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:44.960000 audit[7342]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb1613bd0 a2=0 a3=7ffdb1613bbc items=0 ppid=2913 pid=7342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.145814 kernel: audit: type=1300 audit(1734057164.960:1570): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb1613bd0 a2=0 a3=7ffdb1613bbc items=0 ppid=2913 pid=7342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.145864 kernel: audit: type=1327 audit(1734057164.960:1570): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:44.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:45.204000 audit[7342]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=7342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:45.204000 audit[7342]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb1613bd0 a2=0 a3=7ffdb1613bbc items=0 ppid=2913 pid=7342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.361990 kernel: audit: type=1325 audit(1734057165.204:1571): table=nat:123 family=2 entries=106 op=nft_register_chain pid=7342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:45.362082 kernel: audit: type=1300 audit(1734057165.204:1571): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb1613bd0 a2=0 a3=7ffdb1613bbc items=0 ppid=2913 pid=7342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.362121 kernel: audit: type=1327 audit(1734057165.204:1571): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:45.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:45.868152 systemd[1]: Started sshd@28-147.75.203.55:22-139.178.68.195:57890.service. Dec 13 02:32:45.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.55:22-139.178.68.195:57890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:45.965435 kernel: audit: type=1130 audit(1734057165.867:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.55:22-139.178.68.195:57890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:45.992000 audit[7345]: USER_ACCT pid=7345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:45.993651 sshd[7345]: Accepted publickey for core from 139.178.68.195 port 57890 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:45.995705 sshd[7345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:45.998154 systemd-logind[1559]: New session 25 of user core. Dec 13 02:32:45.998655 systemd[1]: Started session-25.scope. Dec 13 02:32:46.076666 sshd[7345]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:46.077989 systemd[1]: sshd@28-147.75.203.55:22-139.178.68.195:57890.service: Deactivated successfully. Dec 13 02:32:46.078435 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:32:46.078768 systemd-logind[1559]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:32:46.079210 systemd-logind[1559]: Removed session 25. Dec 13 02:32:45.994000 audit[7345]: CRED_ACQ pid=7345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.177667 kernel: audit: type=1101 audit(1734057165.992:1573): pid=7345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.177706 kernel: audit: type=1103 audit(1734057165.994:1574): pid=7345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.177721 kernel: audit: type=1006 audit(1734057165.994:1575): pid=7345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:32:45.994000 audit[7345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd54dccac0 a2=3 a3=0 items=0 ppid=1 pid=7345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:45.999000 audit[7345]: USER_START pid=7345 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:45.999000 audit[7347]: CRED_ACQ pid=7347 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.075000 audit[7345]: USER_END pid=7345 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.075000 audit[7345]: CRED_DISP pid=7345 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:46.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.55:22-139.178.68.195:57890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:51.085955 systemd[1]: Started sshd@29-147.75.203.55:22-139.178.68.195:38630.service. Dec 13 02:32:51.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.55:22-139.178.68.195:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:51.113423 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:32:51.113513 kernel: audit: type=1130 audit(1734057171.084:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.55:22-139.178.68.195:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:51.232000 audit[7370]: USER_ACCT pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.233529 sshd[7370]: Accepted publickey for core from 139.178.68.195 port 38630 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:51.234295 sshd[7370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:51.236583 systemd-logind[1559]: New session 26 of user core. Dec 13 02:32:51.237046 systemd[1]: Started session-26.scope. Dec 13 02:32:51.313575 sshd[7370]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:51.314940 systemd[1]: sshd@29-147.75.203.55:22-139.178.68.195:38630.service: Deactivated successfully. Dec 13 02:32:51.315383 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:32:51.315786 systemd-logind[1559]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:32:51.316263 systemd-logind[1559]: Removed session 26. Dec 13 02:32:51.232000 audit[7370]: CRED_ACQ pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.416449 kernel: audit: type=1101 audit(1734057171.232:1582): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.416512 kernel: audit: type=1103 audit(1734057171.232:1583): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.416533 kernel: audit: type=1006 audit(1734057171.232:1584): pid=7370 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:32:51.475579 kernel: audit: type=1300 audit(1734057171.232:1584): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf60aa80 a2=3 a3=0 items=0 ppid=1 pid=7370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:51.232000 audit[7370]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf60aa80 a2=3 a3=0 items=0 ppid=1 pid=7370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:51.568433 kernel: audit: type=1327 audit(1734057171.232:1584): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:51.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:51.599182 kernel: audit: type=1105 audit(1734057171.237:1585): pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.237000 audit[7370]: USER_START pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.694449 kernel: audit: type=1103 audit(1734057171.238:1586): pid=7372 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.238000 audit[7372]: CRED_ACQ pid=7372 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.783846 kernel: audit: type=1106 audit(1734057171.312:1587): pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.312000 audit[7370]: USER_END pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.880170 kernel: audit: type=1104 audit(1734057171.312:1588): pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.312000 audit[7370]: CRED_DISP pid=7370 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:51.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.55:22-139.178.68.195:38630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:52.849955 systemd[1]: Started sshd@30-147.75.203.55:22-135.125.200.99:46278.service. Dec 13 02:32:52.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.55:22-135.125.200.99:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:53.740359 sshd[7394]: Invalid user xco from 135.125.200.99 port 46278 Dec 13 02:32:53.746878 sshd[7394]: pam_faillock(sshd:auth): User unknown Dec 13 02:32:53.748088 sshd[7394]: pam_unix(sshd:auth): check pass; user unknown Dec 13 02:32:53.748186 sshd[7394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.200.99 Dec 13 02:32:53.749269 sshd[7394]: pam_faillock(sshd:auth): User unknown Dec 13 02:32:53.748000 audit[7394]: USER_AUTH pid=7394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xco" exe="/usr/sbin/sshd" hostname=135.125.200.99 addr=135.125.200.99 terminal=ssh res=failed' Dec 13 02:32:55.429971 sshd[7394]: Failed password for invalid user xco from 135.125.200.99 port 46278 ssh2 Dec 13 02:32:55.650000 audit[5106]: AVC avc: denied { watch } for pid=5106 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.782946972/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c370 tclass=file permissive=0 Dec 13 02:32:55.650000 audit[5106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001624360 a2=fc6 a3=0 items=0 ppid=4354 pid=5106 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c370 key=(null) Dec 13 02:32:55.650000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:32:56.175788 sshd[7394]: Received disconnect from 135.125.200.99 port 46278:11: Bye Bye [preauth] Dec 13 02:32:56.175788 sshd[7394]: Disconnected from invalid user xco 135.125.200.99 port 46278 [preauth] Dec 13 02:32:56.178358 systemd[1]: sshd@30-147.75.203.55:22-135.125.200.99:46278.service: Deactivated successfully. Dec 13 02:32:56.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.55:22-135.125.200.99:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.206400 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 02:32:56.206482 kernel: audit: type=1131 audit(1734057176.177:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.55:22-135.125.200.99:46278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.316939 systemd[1]: Started sshd@31-147.75.203.55:22-139.178.68.195:33728.service. Dec 13 02:32:56.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.203.55:22-139.178.68.195:33728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.406443 kernel: audit: type=1130 audit(1734057176.315:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.203.55:22-139.178.68.195:33728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.433000 audit[7427]: USER_ACCT pid=7427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.435758 sshd[7427]: Accepted publickey for core from 139.178.68.195 port 33728 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:32:56.439490 sshd[7427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:56.443081 systemd-logind[1559]: New session 27 of user core. Dec 13 02:32:56.443704 systemd[1]: Started session-27.scope. Dec 13 02:32:56.437000 audit[7427]: CRED_ACQ pid=7427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.529776 sshd[7427]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:56.531165 systemd[1]: sshd@31-147.75.203.55:22-139.178.68.195:33728.service: Deactivated successfully. Dec 13 02:32:56.531627 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 02:32:56.532042 systemd-logind[1559]: Session 27 logged out. Waiting for processes to exit. Dec 13 02:32:56.532526 systemd-logind[1559]: Removed session 27. Dec 13 02:32:56.618056 kernel: audit: type=1101 audit(1734057176.433:1595): pid=7427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.618091 kernel: audit: type=1103 audit(1734057176.437:1596): pid=7427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.618112 kernel: audit: type=1006 audit(1734057176.437:1597): pid=7427 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 02:32:56.676681 kernel: audit: type=1300 audit(1734057176.437:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63614360 a2=3 a3=0 items=0 ppid=1 pid=7427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:56.437000 audit[7427]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc63614360 a2=3 a3=0 items=0 ppid=1 pid=7427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:56.768644 kernel: audit: type=1327 audit(1734057176.437:1597): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:56.437000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:56.799161 kernel: audit: type=1105 audit(1734057176.444:1598): pid=7427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.444000 audit[7427]: USER_START pid=7427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.894536 kernel: audit: type=1103 audit(1734057176.445:1599): pid=7431 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.445000 audit[7431]: CRED_ACQ pid=7431 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.983747 kernel: audit: type=1106 audit(1734057176.529:1600): pid=7427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.529000 audit[7427]: USER_END pid=7427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.529000 audit[7427]: CRED_DISP pid=7427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:32:56.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.203.55:22-139.178.68.195:33728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:57.910000 audit[5339]: AVC avc: denied { watch } for pid=5339 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_25_39.1593516579/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c192,c381 tclass=file permissive=0 Dec 13 02:32:57.910000 audit[5339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c3c460 a2=fc6 a3=0 items=0 ppid=4996 pid=5339 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c381 key=(null) Dec 13 02:32:57.910000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:33:01.540171 systemd[1]: Started sshd@32-147.75.203.55:22-139.178.68.195:33730.service. Dec 13 02:33:01.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.203.55:22-139.178.68.195:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:01.566658 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 02:33:01.566700 kernel: audit: type=1130 audit(1734057181.538:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.203.55:22-139.178.68.195:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:01.685000 audit[7453]: USER_ACCT pid=7453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.685860 sshd[7453]: Accepted publickey for core from 139.178.68.195 port 33730 ssh2: RSA SHA256:zlnHIdneqLCn2LAFHuCmziN2krffEws9kYgisk+y46U Dec 13 02:33:01.686984 sshd[7453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:01.689081 systemd-logind[1559]: New session 28 of user core. Dec 13 02:33:01.689603 systemd[1]: Started session-28.scope. Dec 13 02:33:01.685000 audit[7453]: CRED_ACQ pid=7453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.780244 sshd[7453]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:01.781537 systemd[1]: sshd@32-147.75.203.55:22-139.178.68.195:33730.service: Deactivated successfully. Dec 13 02:33:01.781986 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 02:33:01.782286 systemd-logind[1559]: Session 28 logged out. Waiting for processes to exit. Dec 13 02:33:01.782694 systemd-logind[1559]: Removed session 28. Dec 13 02:33:01.868626 kernel: audit: type=1101 audit(1734057181.685:1605): pid=7453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.868668 kernel: audit: type=1103 audit(1734057181.685:1606): pid=7453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.868688 kernel: audit: type=1006 audit(1734057181.685:1607): pid=7453 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 02:33:01.685000 audit[7453]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaeecb3a0 a2=3 a3=0 items=0 ppid=1 pid=7453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.019926 kernel: audit: type=1300 audit(1734057181.685:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaeecb3a0 a2=3 a3=0 items=0 ppid=1 pid=7453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.019959 kernel: audit: type=1327 audit(1734057181.685:1607): proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:01.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:02.050574 kernel: audit: type=1105 audit(1734057181.690:1608): pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.690000 audit[7453]: USER_START pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:02.145527 kernel: audit: type=1103 audit(1734057181.690:1609): pid=7455 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.690000 audit[7455]: CRED_ACQ pid=7455 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:02.235180 kernel: audit: type=1106 audit(1734057181.779:1610): pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.779000 audit[7453]: USER_END pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:02.331157 kernel: audit: type=1104 audit(1734057181.779:1611): pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.779000 audit[7453]: CRED_DISP pid=7453 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:33:01.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.203.55:22-139.178.68.195:33730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'