Dec 13 14:35:33.573533 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:35:33.573546 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:35:33.573553 kernel: BIOS-provided physical RAM map: Dec 13 14:35:33.573557 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 14:35:33.573560 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 14:35:33.573564 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 14:35:33.573568 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 14:35:33.573572 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 14:35:33.573576 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b2afff] usable Dec 13 14:35:33.573580 kernel: BIOS-e820: [mem 0x0000000081b2b000-0x0000000081b2bfff] ACPI NVS Dec 13 14:35:33.573584 kernel: BIOS-e820: [mem 0x0000000081b2c000-0x0000000081b2cfff] reserved Dec 13 14:35:33.573588 kernel: BIOS-e820: [mem 0x0000000081b2d000-0x000000008afccfff] usable Dec 13 14:35:33.573591 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 14:35:33.573595 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 14:35:33.573600 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 14:35:33.573605 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 14:35:33.573609 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 14:35:33.573613 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 14:35:33.573617 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 14:35:33.573621 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 14:35:33.573625 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 14:35:33.573629 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:35:33.573633 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 14:35:33.573637 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 14:35:33.573641 kernel: NX (Execute Disable) protection: active Dec 13 14:35:33.573645 kernel: SMBIOS 3.2.1 present. Dec 13 14:35:33.573650 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 14:35:33.573654 kernel: tsc: Detected 3400.000 MHz processor Dec 13 14:35:33.573658 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 14:35:33.573662 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:35:33.573667 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:35:33.573671 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 14:35:33.573676 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:35:33.573680 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 14:35:33.573684 kernel: Using GB pages for direct mapping Dec 13 14:35:33.573688 kernel: ACPI: Early table checksum verification disabled Dec 13 14:35:33.573693 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 14:35:33.573697 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 14:35:33.573701 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 14:35:33.573706 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 14:35:33.573712 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 14:35:33.573716 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 14:35:33.573722 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 14:35:33.573726 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 14:35:33.573731 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 14:35:33.573735 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 14:35:33.573740 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 14:35:33.573744 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 14:35:33.573749 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 14:35:33.573753 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 14:35:33.573759 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 14:35:33.573763 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 14:35:33.573768 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 14:35:33.573772 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 14:35:33.573777 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 14:35:33.573781 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 14:35:33.573786 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 14:35:33.573790 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 14:35:33.573796 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 14:35:33.573800 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:35:33.573805 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 14:35:33.573809 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 14:35:33.573814 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 14:35:33.573818 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 14:35:33.573823 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 14:35:33.573827 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 14:35:33.573832 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 14:35:33.573837 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 14:35:33.573842 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 14:35:33.573847 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 14:35:33.573851 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 14:35:33.573856 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 14:35:33.573860 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 14:35:33.573865 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 14:35:33.573869 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 14:35:33.573874 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 14:35:33.573879 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 14:35:33.573883 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 14:35:33.573888 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 14:35:33.573892 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 14:35:33.573897 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 14:35:33.573901 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 14:35:33.573906 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 14:35:33.573910 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 14:35:33.573915 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 14:35:33.573920 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 14:35:33.573925 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 14:35:33.573929 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 14:35:33.573933 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 14:35:33.573938 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 14:35:33.573942 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 14:35:33.573947 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 14:35:33.573952 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 14:35:33.573957 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 14:35:33.573961 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 14:35:33.573966 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 14:35:33.573970 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 14:35:33.573975 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 14:35:33.573979 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 14:35:33.573984 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 14:35:33.573988 kernel: No NUMA configuration found Dec 13 14:35:33.573993 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 14:35:33.573998 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 14:35:33.574003 kernel: Zone ranges: Dec 13 14:35:33.574007 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:35:33.574012 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:35:33.574016 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 14:35:33.574021 kernel: Movable zone start for each node Dec 13 14:35:33.574025 kernel: Early memory node ranges Dec 13 14:35:33.574030 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 14:35:33.574034 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 14:35:33.574039 kernel: node 0: [mem 0x0000000040400000-0x0000000081b2afff] Dec 13 14:35:33.574044 kernel: node 0: [mem 0x0000000081b2d000-0x000000008afccfff] Dec 13 14:35:33.574049 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 14:35:33.574053 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 14:35:33.574058 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 14:35:33.574062 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 14:35:33.574067 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:35:33.574074 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 14:35:33.574080 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 14:35:33.574085 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 14:35:33.574090 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 14:35:33.574095 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 14:35:33.574100 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 14:35:33.574105 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 14:35:33.574110 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 14:35:33.574115 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:35:33.574120 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:35:33.574125 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:35:33.574130 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:35:33.574135 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:35:33.574140 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:35:33.574145 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:35:33.574149 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:35:33.574154 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:35:33.574159 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:35:33.574164 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:35:33.574169 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:35:33.574174 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:35:33.574179 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:35:33.574184 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:35:33.574189 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:35:33.574193 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 14:35:33.574198 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:35:33.574203 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:35:33.574208 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:35:33.574213 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:35:33.574218 kernel: TSC deadline timer available Dec 13 14:35:33.574223 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 14:35:33.574228 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 14:35:33.574233 kernel: Booting paravirtualized kernel on bare hardware Dec 13 14:35:33.574238 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:35:33.574243 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 14:35:33.574248 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:35:33.574253 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:35:33.574257 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 14:35:33.574263 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 14:35:33.574268 kernel: Policy zone: Normal Dec 13 14:35:33.574273 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:35:33.574278 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:35:33.574283 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 14:35:33.574288 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 14:35:33.574293 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:35:33.574298 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 730116K reserved, 0K cma-reserved) Dec 13 14:35:33.574304 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 14:35:33.574309 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:35:33.574314 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:35:33.574319 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:35:33.574324 kernel: rcu: RCU event tracing is enabled. Dec 13 14:35:33.574329 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 14:35:33.574334 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:35:33.574339 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:35:33.574344 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:35:33.574370 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 14:35:33.574375 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 14:35:33.574380 kernel: random: crng init done Dec 13 14:35:33.574385 kernel: Console: colour dummy device 80x25 Dec 13 14:35:33.574390 kernel: printk: console [tty0] enabled Dec 13 14:35:33.574395 kernel: printk: console [ttyS1] enabled Dec 13 14:35:33.574400 kernel: ACPI: Core revision 20210730 Dec 13 14:35:33.574405 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 14:35:33.574410 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:35:33.574430 kernel: DMAR: Host address width 39 Dec 13 14:35:33.574435 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 14:35:33.574440 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 14:35:33.574445 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 14:35:33.574450 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 14:35:33.574454 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 14:35:33.574459 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 14:35:33.574464 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 14:35:33.574469 kernel: x2apic enabled Dec 13 14:35:33.574474 kernel: Switched APIC routing to cluster x2apic. Dec 13 14:35:33.574479 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 14:35:33.574484 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 14:35:33.574489 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 14:35:33.574494 kernel: process: using mwait in idle threads Dec 13 14:35:33.574499 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:35:33.574504 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:35:33.574509 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:35:33.574513 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:35:33.574519 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:35:33.574524 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:35:33.574529 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:35:33.574534 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:35:33.574538 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:35:33.574543 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:35:33.574548 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:35:33.574553 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:35:33.574558 kernel: TAA: Mitigation: TSX disabled Dec 13 14:35:33.574563 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 14:35:33.574567 kernel: SRBDS: Mitigation: Microcode Dec 13 14:35:33.574573 kernel: GDS: Vulnerable: No microcode Dec 13 14:35:33.574578 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:35:33.574582 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:35:33.574587 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:35:33.574592 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:35:33.574597 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:35:33.574601 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:35:33.574606 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:35:33.574611 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:35:33.574616 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 14:35:33.574620 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:35:33.574626 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:35:33.574631 kernel: LSM: Security Framework initializing Dec 13 14:35:33.574636 kernel: SELinux: Initializing. Dec 13 14:35:33.574640 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:35:33.574645 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:35:33.574650 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 14:35:33.574655 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:35:33.574660 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 14:35:33.574665 kernel: ... version: 4 Dec 13 14:35:33.574670 kernel: ... bit width: 48 Dec 13 14:35:33.574674 kernel: ... generic registers: 4 Dec 13 14:35:33.574680 kernel: ... value mask: 0000ffffffffffff Dec 13 14:35:33.574685 kernel: ... max period: 00007fffffffffff Dec 13 14:35:33.574690 kernel: ... fixed-purpose events: 3 Dec 13 14:35:33.574694 kernel: ... event mask: 000000070000000f Dec 13 14:35:33.574699 kernel: signal: max sigframe size: 2032 Dec 13 14:35:33.574704 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:35:33.574709 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 14:35:33.574714 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:35:33.574718 kernel: x86: Booting SMP configuration: Dec 13 14:35:33.574724 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 14:35:33.574730 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:35:33.574734 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 14:35:33.574739 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 14:35:33.574744 kernel: smpboot: Max logical packages: 1 Dec 13 14:35:33.574749 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 14:35:33.574754 kernel: devtmpfs: initialized Dec 13 14:35:33.574758 kernel: x86/mm: Memory block size: 128MB Dec 13 14:35:33.574763 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b2b000-0x81b2bfff] (4096 bytes) Dec 13 14:35:33.574769 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 14:35:33.574774 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:35:33.574779 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 14:35:33.574784 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:35:33.574789 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:35:33.574794 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:35:33.574799 kernel: audit: type=2000 audit(1734100528.041:1): state=initialized audit_enabled=0 res=1 Dec 13 14:35:33.574803 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:35:33.574808 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:35:33.574814 kernel: cpuidle: using governor menu Dec 13 14:35:33.574818 kernel: ACPI: bus type PCI registered Dec 13 14:35:33.574823 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:35:33.574828 kernel: dca service started, version 1.12.1 Dec 13 14:35:33.574833 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 14:35:33.574838 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 14:35:33.574843 kernel: PCI: Using configuration type 1 for base access Dec 13 14:35:33.574847 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 14:35:33.574852 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:35:33.574858 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:35:33.574863 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:35:33.574867 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:35:33.574872 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:35:33.574877 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:35:33.574882 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:35:33.574887 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:35:33.574891 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:35:33.574896 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:35:33.574902 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 14:35:33.574907 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574912 kernel: ACPI: SSDT 0xFFFF933F40218900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 14:35:33.574917 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 14:35:33.574921 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574926 kernel: ACPI: SSDT 0xFFFF933F41AE1400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 14:35:33.574931 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574936 kernel: ACPI: SSDT 0xFFFF933F41A59800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 14:35:33.574940 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574946 kernel: ACPI: SSDT 0xFFFF933F41B4B800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 14:35:33.574951 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574956 kernel: ACPI: SSDT 0xFFFF933F40149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 14:35:33.574960 kernel: ACPI: Dynamic OEM Table Load: Dec 13 14:35:33.574965 kernel: ACPI: SSDT 0xFFFF933F41AE6000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 14:35:33.574970 kernel: ACPI: Interpreter enabled Dec 13 14:35:33.574975 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:35:33.574980 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:35:33.574985 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 14:35:33.574990 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 14:35:33.574995 kernel: HEST: Table parsing has been initialized. Dec 13 14:35:33.575000 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 14:35:33.575005 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:35:33.575010 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 14:35:33.575015 kernel: ACPI: PM: Power Resource [USBC] Dec 13 14:35:33.575020 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 14:35:33.575024 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 14:35:33.575029 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 14:35:33.575034 kernel: ACPI: PM: Power Resource [WRST] Dec 13 14:35:33.575039 kernel: ACPI: PM: Power Resource [FN00] Dec 13 14:35:33.575044 kernel: ACPI: PM: Power Resource [FN01] Dec 13 14:35:33.575049 kernel: ACPI: PM: Power Resource [FN02] Dec 13 14:35:33.575054 kernel: ACPI: PM: Power Resource [FN03] Dec 13 14:35:33.575058 kernel: ACPI: PM: Power Resource [FN04] Dec 13 14:35:33.575063 kernel: ACPI: PM: Power Resource [PIN] Dec 13 14:35:33.575068 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 14:35:33.575132 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:35:33.575180 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 14:35:33.575221 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 14:35:33.575229 kernel: PCI host bridge to bus 0000:00 Dec 13 14:35:33.575273 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:35:33.575311 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:35:33.575351 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:35:33.575411 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 14:35:33.575465 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 14:35:33.575502 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 14:35:33.575551 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 14:35:33.575602 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 14:35:33.575645 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.575692 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 14:35:33.575735 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 14:35:33.575782 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 14:35:33.575825 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 14:35:33.575871 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 14:35:33.575914 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 14:35:33.575957 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 14:35:33.576005 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 14:35:33.576047 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 14:35:33.576089 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 14:35:33.576133 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 14:35:33.576175 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 14:35:33.576222 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 14:35:33.576266 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 14:35:33.576310 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 14:35:33.576371 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 14:35:33.576414 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 14:35:33.576460 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 14:35:33.576502 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 14:35:33.576544 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 14:35:33.576590 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 14:35:33.576633 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 14:35:33.576674 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 14:35:33.576721 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 14:35:33.576763 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 14:35:33.576807 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 14:35:33.576853 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 14:35:33.576898 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 14:35:33.576940 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 14:35:33.576982 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 14:35:33.577025 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 14:35:33.577071 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 14:35:33.577114 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.577160 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 14:35:33.577205 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.577253 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 14:35:33.577296 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.577343 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 14:35:33.577389 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.577437 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 14:35:33.577481 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.577530 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 14:35:33.577573 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 14:35:33.577621 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 14:35:33.577668 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 14:35:33.577710 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 14:35:33.577753 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 14:35:33.577801 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 14:35:33.577844 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 14:35:33.577895 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 14:35:33.577941 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 14:35:33.577985 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 14:35:33.578029 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 14:35:33.578072 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 14:35:33.578116 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 14:35:33.578164 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 14:35:33.578210 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 14:35:33.578255 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 14:35:33.578299 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 14:35:33.578342 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 14:35:33.578388 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 14:35:33.578432 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:35:33.578475 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 14:35:33.578521 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 14:35:33.578564 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 14:35:33.578613 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 14:35:33.578658 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 14:35:33.578701 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 14:35:33.578746 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 14:35:33.578790 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 14:35:33.578833 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.578878 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 14:35:33.578922 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 14:35:33.578964 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 14:35:33.579013 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 14:35:33.579058 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 14:35:33.579102 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 14:35:33.579176 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 14:35:33.579244 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 14:35:33.579288 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:35:33.579331 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 14:35:33.579377 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 14:35:33.579419 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 14:35:33.579462 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 14:35:33.579510 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 14:35:33.579555 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 14:35:33.579601 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 14:35:33.579646 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:35:33.579689 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 14:35:33.579731 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 14:35:33.579774 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 14:35:33.579824 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 14:35:33.579874 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 14:35:33.579922 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 14:35:33.579969 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 14:35:33.580014 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 14:35:33.580061 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:35:33.580105 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 14:35:33.580154 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:35:33.580197 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 14:35:33.580243 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 14:35:33.580288 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 14:35:33.580295 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 14:35:33.580301 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 14:35:33.580306 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 14:35:33.580312 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 14:35:33.580317 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 14:35:33.580322 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 14:35:33.580327 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 14:35:33.580334 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 14:35:33.580339 kernel: iommu: Default domain type: Translated Dec 13 14:35:33.580345 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:35:33.580392 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 14:35:33.580439 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:35:33.580485 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 14:35:33.580494 kernel: vgaarb: loaded Dec 13 14:35:33.580500 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:35:33.580506 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:35:33.580512 kernel: PTP clock support registered Dec 13 14:35:33.580517 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:35:33.580522 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:35:33.580528 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 14:35:33.580533 kernel: e820: reserve RAM buffer [mem 0x81b2b000-0x83ffffff] Dec 13 14:35:33.580538 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 14:35:33.580543 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 14:35:33.580548 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 14:35:33.580554 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 14:35:33.580559 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:35:33.580565 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:35:33.580570 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:35:33.580575 kernel: pnp: PnP ACPI init Dec 13 14:35:33.580618 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 14:35:33.580661 kernel: pnp 00:02: [dma 0 disabled] Dec 13 14:35:33.580703 kernel: pnp 00:03: [dma 0 disabled] Dec 13 14:35:33.580750 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 14:35:33.580788 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 14:35:33.580829 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 14:35:33.580872 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 14:35:33.580910 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 14:35:33.580949 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 14:35:33.580988 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 14:35:33.581026 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 14:35:33.581064 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 14:35:33.581102 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 14:35:33.581140 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 14:35:33.581181 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 14:35:33.581220 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 14:35:33.581260 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 14:35:33.581298 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 14:35:33.581337 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 14:35:33.581377 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 14:35:33.581434 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 14:35:33.581474 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 14:35:33.581482 kernel: pnp: PnP ACPI: found 10 devices Dec 13 14:35:33.581489 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:35:33.581494 kernel: NET: Registered PF_INET protocol family Dec 13 14:35:33.581500 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:35:33.581505 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:35:33.581510 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:35:33.581515 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:35:33.581521 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:35:33.581526 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 14:35:33.581531 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 14:35:33.581537 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 14:35:33.581542 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:35:33.581548 kernel: NET: Registered PF_XDP protocol family Dec 13 14:35:33.581591 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 14:35:33.581634 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 14:35:33.581676 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 14:35:33.581720 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 14:35:33.581764 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 14:35:33.581811 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 14:35:33.581854 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 14:35:33.581896 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:35:33.581939 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 14:35:33.581981 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 14:35:33.582023 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 14:35:33.582067 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 14:35:33.582109 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 14:35:33.582151 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 14:35:33.582192 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 14:35:33.582236 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 14:35:33.582277 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 14:35:33.582319 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 14:35:33.582388 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 14:35:33.582433 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 14:35:33.582477 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 14:35:33.582519 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 14:35:33.582563 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 14:35:33.582605 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 14:35:33.582644 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 14:35:33.582682 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:35:33.582719 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:35:33.582758 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:35:33.582794 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 14:35:33.582833 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 14:35:33.582876 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 14:35:33.582916 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 14:35:33.582962 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 14:35:33.583003 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 14:35:33.583048 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 14:35:33.583087 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 14:35:33.583130 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 14:35:33.583169 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 14:35:33.583211 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 14:35:33.583252 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 14:35:33.583261 kernel: PCI: CLS 64 bytes, default 64 Dec 13 14:35:33.583266 kernel: DMAR: No ATSR found Dec 13 14:35:33.583272 kernel: DMAR: No SATC found Dec 13 14:35:33.583277 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 14:35:33.583319 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 14:35:33.583367 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 14:35:33.583410 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 14:35:33.583453 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 14:35:33.583497 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 14:35:33.583540 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 14:35:33.583582 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 14:35:33.583624 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 14:35:33.583666 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 14:35:33.583708 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 14:35:33.583751 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 14:35:33.583793 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 14:35:33.583836 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 14:35:33.583880 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 14:35:33.583924 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 14:35:33.583967 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 14:35:33.584009 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 14:35:33.584053 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 14:35:33.584094 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 14:35:33.584139 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 14:35:33.584181 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 14:35:33.584228 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 14:35:33.584272 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 14:35:33.584317 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 14:35:33.584363 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 14:35:33.584408 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 14:35:33.584454 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 14:35:33.584461 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 14:35:33.584467 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:35:33.584473 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 14:35:33.584479 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 14:35:33.584484 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 14:35:33.584489 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 14:35:33.584495 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 14:35:33.584541 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 14:35:33.584550 kernel: Initialise system trusted keyrings Dec 13 14:35:33.584555 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 14:35:33.584561 kernel: Key type asymmetric registered Dec 13 14:35:33.584567 kernel: Asymmetric key parser 'x509' registered Dec 13 14:35:33.584572 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:35:33.584577 kernel: io scheduler mq-deadline registered Dec 13 14:35:33.584582 kernel: io scheduler kyber registered Dec 13 14:35:33.584588 kernel: io scheduler bfq registered Dec 13 14:35:33.584630 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 14:35:33.584673 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 14:35:33.584717 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 14:35:33.584762 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 14:35:33.584806 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 14:35:33.584849 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 14:35:33.584898 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 14:35:33.584906 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 14:35:33.584911 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 14:35:33.584917 kernel: pstore: Registered erst as persistent store backend Dec 13 14:35:33.584923 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:35:33.584929 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:35:33.584934 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:35:33.584940 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:35:33.584945 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 14:35:33.584990 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 14:35:33.584998 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:35:33.585036 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 14:35:33.585079 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 14:35:33.585118 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T14:35:32 UTC (1734100532) Dec 13 14:35:33.585158 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:35:33.585165 kernel: fail to initialize ptp_kvm Dec 13 14:35:33.585171 kernel: intel_pstate: Intel P-state driver initializing Dec 13 14:35:33.585176 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 14:35:33.585181 kernel: intel_pstate: HWP enabled Dec 13 14:35:33.585187 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 14:35:33.585192 kernel: vesafb: scrolling: redraw Dec 13 14:35:33.585198 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 14:35:33.585204 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000022c74d7f, using 768k, total 768k Dec 13 14:35:33.585209 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:35:33.585214 kernel: fb0: VESA VGA frame buffer device Dec 13 14:35:33.585220 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:35:33.585225 kernel: Segment Routing with IPv6 Dec 13 14:35:33.585230 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:35:33.585236 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:35:33.585241 kernel: Key type dns_resolver registered Dec 13 14:35:33.585247 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 14:35:33.585252 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 14:35:33.585257 kernel: IPI shorthand broadcast: enabled Dec 13 14:35:33.585263 kernel: sched_clock: Marking stable (1680484119, 1339849423)->(4464671712, -1444338170) Dec 13 14:35:33.585268 kernel: registered taskstats version 1 Dec 13 14:35:33.585273 kernel: Loading compiled-in X.509 certificates Dec 13 14:35:33.585279 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:35:33.585284 kernel: Key type .fscrypt registered Dec 13 14:35:33.585289 kernel: Key type fscrypt-provisioning registered Dec 13 14:35:33.585296 kernel: pstore: Using crash dump compression: deflate Dec 13 14:35:33.585301 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:35:33.585306 kernel: ima: No architecture policies found Dec 13 14:35:33.585312 kernel: clk: Disabling unused clocks Dec 13 14:35:33.585317 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:35:33.585322 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:35:33.585327 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:35:33.585333 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:35:33.585338 kernel: Run /init as init process Dec 13 14:35:33.585344 kernel: with arguments: Dec 13 14:35:33.585351 kernel: /init Dec 13 14:35:33.585356 kernel: with environment: Dec 13 14:35:33.585361 kernel: HOME=/ Dec 13 14:35:33.585367 kernel: TERM=linux Dec 13 14:35:33.585372 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:35:33.585378 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:35:33.585385 systemd[1]: Detected architecture x86-64. Dec 13 14:35:33.585391 systemd[1]: Running in initrd. Dec 13 14:35:33.585397 systemd[1]: No hostname configured, using default hostname. Dec 13 14:35:33.585402 systemd[1]: Hostname set to . Dec 13 14:35:33.585407 systemd[1]: Initializing machine ID from random generator. Dec 13 14:35:33.585413 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:35:33.585419 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:35:33.585424 systemd[1]: Reached target cryptsetup.target. Dec 13 14:35:33.585429 systemd[1]: Reached target paths.target. Dec 13 14:35:33.585435 systemd[1]: Reached target slices.target. Dec 13 14:35:33.585441 systemd[1]: Reached target swap.target. Dec 13 14:35:33.585446 systemd[1]: Reached target timers.target. Dec 13 14:35:33.585451 systemd[1]: Listening on iscsid.socket. Dec 13 14:35:33.585457 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:35:33.585463 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:35:33.585468 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:35:33.585474 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:35:33.585480 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Dec 13 14:35:33.585485 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Dec 13 14:35:33.585490 kernel: clocksource: Switched to clocksource tsc Dec 13 14:35:33.585496 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:35:33.585501 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:35:33.585507 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:35:33.585512 systemd[1]: Reached target sockets.target. Dec 13 14:35:33.585518 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:35:33.585524 systemd[1]: Finished network-cleanup.service. Dec 13 14:35:33.585529 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:35:33.585535 systemd[1]: Starting systemd-journald.service... Dec 13 14:35:33.585540 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:35:33.585548 systemd-journald[267]: Journal started Dec 13 14:35:33.585574 systemd-journald[267]: Runtime Journal (/run/log/journal/a22de4a21eb649408c8aae1ddf322f01) is 8.0M, max 640.1M, 632.1M free. Dec 13 14:35:33.587635 systemd-modules-load[268]: Inserted module 'overlay' Dec 13 14:35:33.616523 kernel: audit: type=1334 audit(1734100533.592:2): prog-id=6 op=LOAD Dec 13 14:35:33.616533 systemd[1]: Starting systemd-resolved.service... Dec 13 14:35:33.592000 audit: BPF prog-id=6 op=LOAD Dec 13 14:35:33.661394 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:35:33.661446 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:35:33.694387 kernel: Bridge firewalling registered Dec 13 14:35:33.694427 systemd[1]: Started systemd-journald.service. Dec 13 14:35:33.709014 systemd-modules-load[268]: Inserted module 'br_netfilter' Dec 13 14:35:33.758641 kernel: audit: type=1130 audit(1734100533.716:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.711786 systemd-resolved[270]: Positive Trust Anchors: Dec 13 14:35:33.833537 kernel: SCSI subsystem initialized Dec 13 14:35:33.833551 kernel: audit: type=1130 audit(1734100533.769:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.833559 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:35:33.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.711790 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:35:33.934687 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:35:33.934699 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:35:33.934707 kernel: audit: type=1130 audit(1734100533.889:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.711810 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:35:34.010565 kernel: audit: type=1130 audit(1734100533.943:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.713454 systemd-resolved[270]: Defaulting to hostname 'linux'. Dec 13 14:35:34.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.717693 systemd[1]: Started systemd-resolved.service. Dec 13 14:35:34.118120 kernel: audit: type=1130 audit(1734100534.018:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.118132 kernel: audit: type=1130 audit(1734100534.071:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:33.770537 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:35:33.891184 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:35:33.935026 systemd-modules-load[268]: Inserted module 'dm_multipath' Dec 13 14:35:33.944653 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:35:34.019652 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:35:34.072640 systemd[1]: Reached target nss-lookup.target. Dec 13 14:35:34.126983 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:35:34.134020 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:35:34.148016 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:35:34.148735 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:35:34.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.150927 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:35:34.196553 kernel: audit: type=1130 audit(1734100534.147:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.211697 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:35:34.278460 kernel: audit: type=1130 audit(1734100534.210:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.270026 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:35:34.292462 dracut-cmdline[293]: dracut-dracut-053 Dec 13 14:35:34.292462 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:35:34.292462 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:35:34.391443 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:35:34.391458 kernel: iscsi: registered transport (tcp) Dec 13 14:35:34.391466 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:35:34.416792 kernel: QLogic iSCSI HBA Driver Dec 13 14:35:34.433890 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:35:34.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:34.443128 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:35:34.498431 kernel: raid6: avx2x4 gen() 48914 MB/s Dec 13 14:35:34.534380 kernel: raid6: avx2x4 xor() 21112 MB/s Dec 13 14:35:34.568434 kernel: raid6: avx2x2 gen() 52256 MB/s Dec 13 14:35:34.603442 kernel: raid6: avx2x2 xor() 31972 MB/s Dec 13 14:35:34.638432 kernel: raid6: avx2x1 gen() 45174 MB/s Dec 13 14:35:34.671438 kernel: raid6: avx2x1 xor() 27810 MB/s Dec 13 14:35:34.705437 kernel: raid6: sse2x4 gen() 21278 MB/s Dec 13 14:35:34.739386 kernel: raid6: sse2x4 xor() 11979 MB/s Dec 13 14:35:34.773434 kernel: raid6: sse2x2 gen() 21610 MB/s Dec 13 14:35:34.807386 kernel: raid6: sse2x2 xor() 13400 MB/s Dec 13 14:35:34.841437 kernel: raid6: sse2x1 gen() 18241 MB/s Dec 13 14:35:34.892886 kernel: raid6: sse2x1 xor() 8898 MB/s Dec 13 14:35:34.892902 kernel: raid6: using algorithm avx2x2 gen() 52256 MB/s Dec 13 14:35:34.892909 kernel: raid6: .... xor() 31972 MB/s, rmw enabled Dec 13 14:35:34.910899 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:35:34.956358 kernel: xor: automatically using best checksumming function avx Dec 13 14:35:35.036382 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:35:35.040966 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:35:35.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:35.049000 audit: BPF prog-id=7 op=LOAD Dec 13 14:35:35.049000 audit: BPF prog-id=8 op=LOAD Dec 13 14:35:35.051322 systemd[1]: Starting systemd-udevd.service... Dec 13 14:35:35.059456 systemd-udevd[473]: Using default interface naming scheme 'v252'. Dec 13 14:35:35.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:35.065581 systemd[1]: Started systemd-udevd.service. Dec 13 14:35:35.103483 dracut-pre-trigger[484]: rd.md=0: removing MD RAID activation Dec 13 14:35:35.079986 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:35:35.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:35.110057 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:35:35.120543 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:35:35.172923 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:35:35.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:35.200392 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:35:35.202364 kernel: libata version 3.00 loaded. Dec 13 14:35:35.202387 kernel: ACPI: bus type USB registered Dec 13 14:35:35.236633 kernel: usbcore: registered new interface driver usbfs Dec 13 14:35:35.236672 kernel: usbcore: registered new interface driver hub Dec 13 14:35:35.271570 kernel: usbcore: registered new device driver usb Dec 13 14:35:35.272379 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:35:35.305352 kernel: AES CTR mode by8 optimization enabled Dec 13 14:35:35.305372 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 14:35:35.322354 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 14:35:35.864647 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 14:35:35.864660 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 14:35:35.864724 kernel: pps pps0: new PPS source ptp0 Dec 13 14:35:35.864785 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 14:35:35.864842 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 14:35:35.864894 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0a Dec 13 14:35:35.864945 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 14:35:35.864997 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 14:35:35.865047 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 14:35:35.865098 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 14:35:35.865146 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 14:35:35.865194 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 14:35:35.865244 kernel: pps pps1: new PPS source ptp1 Dec 13 14:35:35.865297 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 14:35:35.865353 kernel: scsi host0: ahci Dec 13 14:35:35.865412 kernel: scsi host1: ahci Dec 13 14:35:35.865468 kernel: scsi host2: ahci Dec 13 14:35:35.865520 kernel: scsi host3: ahci Dec 13 14:35:35.865571 kernel: scsi host4: ahci Dec 13 14:35:35.865622 kernel: scsi host5: ahci Dec 13 14:35:35.865675 kernel: scsi host6: ahci Dec 13 14:35:35.865729 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 136 Dec 13 14:35:35.865737 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 136 Dec 13 14:35:35.865744 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 136 Dec 13 14:35:35.865750 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 136 Dec 13 14:35:35.865757 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 136 Dec 13 14:35:35.865763 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 136 Dec 13 14:35:35.865770 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 136 Dec 13 14:35:35.865777 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 14:35:35.865831 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 14:35:35.865880 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 14:35:35.865931 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 14:35:35.865979 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0b Dec 13 14:35:35.866029 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 14:35:35.866077 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 14:35:35.866127 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 14:35:35.866175 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 14:35:35.866226 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 14:35:35.866276 kernel: hub 1-0:1.0: USB hub found Dec 13 14:35:35.866337 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:35:35.866391 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 14:35:35.866441 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 14:35:35.866449 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 14:35:35.866457 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:35:35.866464 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 14:35:35.866470 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 14:35:35.866476 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:35:35.866483 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:35:35.866489 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 14:35:35.866495 kernel: hub 1-0:1.0: 16 ports detected Dec 13 14:35:35.866548 kernel: hub 2-0:1.0: USB hub found Dec 13 14:35:35.866606 kernel: hub 2-0:1.0: 10 ports detected Dec 13 14:35:35.866660 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 14:35:36.551553 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 14:35:36.551564 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 14:35:36.551627 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 14:35:36.551635 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 14:35:36.551738 kernel: ata1.00: Features: NCQ-prio Dec 13 14:35:36.551746 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 14:35:36.551756 kernel: ata2.00: Features: NCQ-prio Dec 13 14:35:36.551762 kernel: ata1.00: configured for UDMA/133 Dec 13 14:35:36.551769 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 14:35:36.551825 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 14:35:36.756729 kernel: ata2.00: configured for UDMA/133 Dec 13 14:35:36.756763 kernel: port_module: 9 callbacks suppressed Dec 13 14:35:36.756770 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 14:35:36.756845 kernel: hub 1-14:1.0: USB hub found Dec 13 14:35:36.756909 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 14:35:36.756999 kernel: hub 1-14:1.0: 4 ports detected Dec 13 14:35:36.757068 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:35:36.757136 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 14:35:36.757188 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 14:35:36.757195 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 14:35:36.757244 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:36.757253 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 14:35:36.757328 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 14:35:36.757399 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 14:35:36.757491 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 14:35:36.757634 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 14:35:36.757693 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:35:36.757747 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:36.757757 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:35:36.757763 kernel: GPT:9289727 != 937703087 Dec 13 14:35:36.757769 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:35:36.757776 kernel: GPT:9289727 != 937703087 Dec 13 14:35:36.757782 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:35:36.757787 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 14:35:36.757794 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:36.757800 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 14:35:36.757856 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 14:35:36.757908 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:35:36.757962 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:35:36.758015 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 14:35:36.758067 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:35:36.758119 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 14:35:36.758126 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 14:35:36.758140 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 14:35:36.758147 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:35:36.775395 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 14:35:36.786382 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:35:36.817352 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 14:35:36.817469 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (535) Dec 13 14:35:36.843362 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:35:36.883079 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:35:36.883097 kernel: usbcore: registered new interface driver usbhid Dec 13 14:35:36.883104 kernel: usbhid: USB HID core driver Dec 13 14:35:36.855056 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:35:36.928567 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 14:35:36.905434 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:35:36.931546 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:35:36.960341 systemd[1]: Starting disk-uuid.service... Dec 13 14:35:37.161440 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:37.161456 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 14:35:37.161542 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 14:35:37.161550 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 14:35:37.161558 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:37.161565 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 14:35:37.161629 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 14:35:37.161636 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:37.161643 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 14:35:37.161698 disk-uuid[693]: Primary Header is updated. Dec 13 14:35:37.161698 disk-uuid[693]: Secondary Entries is updated. Dec 13 14:35:37.161698 disk-uuid[693]: Secondary Header is updated. Dec 13 14:35:38.148725 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 14:35:38.167380 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Dec 13 14:35:38.167536 disk-uuid[694]: The operation has completed successfully. Dec 13 14:35:38.204444 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:35:38.300407 kernel: audit: type=1130 audit(1734100538.211:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.300426 kernel: audit: type=1131 audit(1734100538.211:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.204489 systemd[1]: Finished disk-uuid.service. Dec 13 14:35:38.330392 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:35:38.215748 systemd[1]: Starting verity-setup.service... Dec 13 14:35:38.406978 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:35:38.418948 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:35:38.431071 systemd[1]: Finished verity-setup.service. Dec 13 14:35:38.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.495394 kernel: audit: type=1130 audit(1734100538.445:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.552714 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:35:38.568531 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:35:38.560644 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:35:38.661634 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:35:38.661651 kernel: BTRFS info (device sdb6): using free space tree Dec 13 14:35:38.661659 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 14:35:38.661666 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 14:35:38.561046 systemd[1]: Starting ignition-setup.service... Dec 13 14:35:38.583803 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:35:38.670949 systemd[1]: Finished ignition-setup.service. Dec 13 14:35:38.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.691776 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:35:38.796822 kernel: audit: type=1130 audit(1734100538.690:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.796836 kernel: audit: type=1130 audit(1734100538.746:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.748048 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:35:38.828650 kernel: audit: type=1334 audit(1734100538.804:24): prog-id=9 op=LOAD Dec 13 14:35:38.804000 audit: BPF prog-id=9 op=LOAD Dec 13 14:35:38.806283 systemd[1]: Starting systemd-networkd.service... Dec 13 14:35:38.843009 systemd-networkd[881]: lo: Link UP Dec 13 14:35:38.904424 kernel: audit: type=1130 audit(1734100538.852:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.843011 systemd-networkd[881]: lo: Gained carrier Dec 13 14:35:38.871412 ignition[869]: Ignition 2.14.0 Dec 13 14:35:38.843358 systemd-networkd[881]: Enumeration completed Dec 13 14:35:38.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.871433 ignition[869]: Stage: fetch-offline Dec 13 14:35:39.072633 kernel: audit: type=1130 audit(1734100538.938:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:39.072722 kernel: audit: type=1130 audit(1734100538.998:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:39.072732 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 14:35:38.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.843434 systemd[1]: Started systemd-networkd.service. Dec 13 14:35:39.097845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 14:35:38.871458 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:38.844133 systemd-networkd[881]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:39.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.871472 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:38.853422 systemd[1]: Reached target network.target. Dec 13 14:35:39.151461 iscsid[902]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:35:39.151461 iscsid[902]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:35:39.151461 iscsid[902]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:35:39.151461 iscsid[902]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:35:39.151461 iscsid[902]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:35:39.151461 iscsid[902]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:35:39.151461 iscsid[902]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:35:39.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.874270 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:39.333469 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 14:35:39.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:38.886594 unknown[869]: fetched base config from "system" Dec 13 14:35:38.874334 ignition[869]: parsed url from cmdline: "" Dec 13 14:35:38.886598 unknown[869]: fetched user config from "system" Dec 13 14:35:38.874335 ignition[869]: no config URL provided Dec 13 14:35:38.913053 systemd[1]: Starting iscsiuio.service... Dec 13 14:35:38.874338 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:35:38.926647 systemd[1]: Started iscsiuio.service. Dec 13 14:35:38.874363 ignition[869]: parsing config with SHA512: 86587cf6b3033d5c3cd4ead2eb5aa91da2ec6e135a153957cdc5382e4cdeadcb1693c8c701376755e1f4a01d4129416faa657a6c5845667d902aa19410f3de38 Dec 13 14:35:38.939655 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:35:38.886875 ignition[869]: fetch-offline: fetch-offline passed Dec 13 14:35:38.999588 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:35:38.886878 ignition[869]: POST message to Packet Timeline Dec 13 14:35:39.000022 systemd[1]: Starting ignition-kargs.service... Dec 13 14:35:38.886883 ignition[869]: POST Status error: resource requires networking Dec 13 14:35:39.073508 systemd-networkd[881]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:38.886939 ignition[869]: Ignition finished successfully Dec 13 14:35:39.087286 systemd[1]: Starting iscsid.service... Dec 13 14:35:39.076928 ignition[892]: Ignition 2.14.0 Dec 13 14:35:39.108493 systemd[1]: Started iscsid.service. Dec 13 14:35:39.076932 ignition[892]: Stage: kargs Dec 13 14:35:39.125875 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:35:39.076987 ignition[892]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:39.144525 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:35:39.076998 ignition[892]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:39.160419 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:35:39.078314 ignition[892]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:39.205510 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:35:39.080303 ignition[892]: kargs: kargs passed Dec 13 14:35:39.235588 systemd[1]: Reached target remote-fs.target. Dec 13 14:35:39.080306 ignition[892]: POST message to Packet Timeline Dec 13 14:35:39.245476 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:35:39.080318 ignition[892]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 14:35:39.279565 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:35:39.083654 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44381->[::1]:53: read: connection refused Dec 13 14:35:39.325113 systemd-networkd[881]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:39.284262 ignition[892]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 14:35:39.353683 systemd-networkd[881]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:35:39.284790 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55133->[::1]:53: read: connection refused Dec 13 14:35:39.382480 systemd-networkd[881]: enp1s0f1np1: Link UP Dec 13 14:35:39.382739 systemd-networkd[881]: enp1s0f1np1: Gained carrier Dec 13 14:35:39.394826 systemd-networkd[881]: enp1s0f0np0: Link UP Dec 13 14:35:39.395190 systemd-networkd[881]: eno2: Link UP Dec 13 14:35:39.395549 systemd-networkd[881]: eno1: Link UP Dec 13 14:35:39.684999 ignition[892]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 14:35:39.686237 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46341->[::1]:53: read: connection refused Dec 13 14:35:40.120032 systemd-networkd[881]: enp1s0f0np0: Gained carrier Dec 13 14:35:40.128620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 14:35:40.148683 systemd-networkd[881]: enp1s0f0np0: DHCPv4 address 147.28.180.89/31, gateway 147.28.180.88 acquired from 145.40.83.140 Dec 13 14:35:40.486576 ignition[892]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 14:35:40.487787 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45933->[::1]:53: read: connection refused Dec 13 14:35:40.544947 systemd-networkd[881]: enp1s0f1np1: Gained IPv6LL Dec 13 14:35:41.184942 systemd-networkd[881]: enp1s0f0np0: Gained IPv6LL Dec 13 14:35:42.089729 ignition[892]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 14:35:42.091036 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57310->[::1]:53: read: connection refused Dec 13 14:35:45.294386 ignition[892]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 14:35:46.197010 ignition[892]: GET result: OK Dec 13 14:35:46.544753 ignition[892]: Ignition finished successfully Dec 13 14:35:46.549489 systemd[1]: Finished ignition-kargs.service. Dec 13 14:35:46.639201 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 14:35:46.639217 kernel: audit: type=1130 audit(1734100546.560:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:46.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:46.570784 ignition[919]: Ignition 2.14.0 Dec 13 14:35:46.563729 systemd[1]: Starting ignition-disks.service... Dec 13 14:35:46.570787 ignition[919]: Stage: disks Dec 13 14:35:46.570860 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:46.570870 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:46.572295 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:46.573951 ignition[919]: disks: disks passed Dec 13 14:35:46.573955 ignition[919]: POST message to Packet Timeline Dec 13 14:35:46.573966 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 14:35:47.089692 ignition[919]: GET result: OK Dec 13 14:35:47.399681 ignition[919]: Ignition finished successfully Dec 13 14:35:47.402892 systemd[1]: Finished ignition-disks.service. Dec 13 14:35:47.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.414953 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:35:47.493618 kernel: audit: type=1130 audit(1734100547.413:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.479562 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:35:47.479671 systemd[1]: Reached target local-fs.target. Dec 13 14:35:47.502574 systemd[1]: Reached target sysinit.target. Dec 13 14:35:47.516585 systemd[1]: Reached target basic.target. Dec 13 14:35:47.530331 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:35:47.548418 systemd-fsck[937]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:35:47.561867 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:35:47.653203 kernel: audit: type=1130 audit(1734100547.569:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.653218 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:35:47.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.591129 systemd[1]: Mounting sysroot.mount... Dec 13 14:35:47.661068 systemd[1]: Mounted sysroot.mount. Dec 13 14:35:47.674703 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:35:47.682423 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:35:47.707233 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:35:47.715992 systemd[1]: Starting flatcar-static-network.service... Dec 13 14:35:47.731477 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:35:47.731592 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:35:47.749244 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:35:47.774150 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:35:47.785803 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:35:47.908020 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (950) Dec 13 14:35:47.908038 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:35:47.908046 kernel: BTRFS info (device sdb6): using free space tree Dec 13 14:35:47.908053 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 14:35:47.908060 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 14:35:47.908071 initrd-setup-root[955]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:35:47.969818 kernel: audit: type=1130 audit(1734100547.915:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.969858 coreos-metadata[945]: Dec 13 14:35:47.863 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 14:35:47.864788 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:35:47.991647 coreos-metadata[944]: Dec 13 14:35:47.863 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 14:35:48.017464 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:35:47.917646 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:35:48.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.071523 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:35:48.109569 kernel: audit: type=1130 audit(1734100548.042:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:47.978979 systemd[1]: Starting ignition-mount.service... Dec 13 14:35:48.116563 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:35:48.004985 systemd[1]: Starting sysroot-boot.service... Dec 13 14:35:48.133575 ignition[1020]: INFO : Ignition 2.14.0 Dec 13 14:35:48.133575 ignition[1020]: INFO : Stage: mount Dec 13 14:35:48.133575 ignition[1020]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:48.133575 ignition[1020]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:48.133575 ignition[1020]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:48.133575 ignition[1020]: INFO : mount: mount passed Dec 13 14:35:48.133575 ignition[1020]: INFO : POST message to Packet Timeline Dec 13 14:35:48.133575 ignition[1020]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 14:35:48.029344 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:35:48.029567 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:35:48.032631 systemd[1]: Finished sysroot-boot.service. Dec 13 14:35:48.518902 coreos-metadata[945]: Dec 13 14:35:48.518 INFO Fetch successful Dec 13 14:35:48.589119 ignition[1020]: INFO : GET result: OK Dec 13 14:35:48.595415 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 14:35:48.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.595468 systemd[1]: Finished flatcar-static-network.service. Dec 13 14:35:48.725589 kernel: audit: type=1130 audit(1734100548.602:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.725602 kernel: audit: type=1131 audit(1734100548.602:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.725630 coreos-metadata[944]: Dec 13 14:35:48.692 INFO Fetch successful Dec 13 14:35:48.725630 coreos-metadata[944]: Dec 13 14:35:48.717 INFO wrote hostname ci-3510.3.6-a-3cae5c42ca to /sysroot/etc/hostname Dec 13 14:35:48.806561 kernel: audit: type=1130 audit(1734100548.734:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.717897 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:35:48.909418 ignition[1020]: INFO : Ignition finished successfully Dec 13 14:35:48.910256 systemd[1]: Finished ignition-mount.service. Dec 13 14:35:48.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.928393 systemd[1]: Starting ignition-files.service... Dec 13 14:35:49.001391 kernel: audit: type=1130 audit(1734100548.926:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:48.996304 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:35:49.058023 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1035) Dec 13 14:35:49.058040 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:35:49.058048 kernel: BTRFS info (device sdb6): using free space tree Dec 13 14:35:49.081210 kernel: BTRFS info (device sdb6): has skinny extents Dec 13 14:35:49.130352 kernel: BTRFS info (device sdb6): enabling ssd optimizations Dec 13 14:35:49.131611 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:35:49.148523 ignition[1054]: INFO : Ignition 2.14.0 Dec 13 14:35:49.148523 ignition[1054]: INFO : Stage: files Dec 13 14:35:49.148523 ignition[1054]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:49.148523 ignition[1054]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:49.148523 ignition[1054]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:49.152085 unknown[1054]: wrote ssh authorized keys file for user: core Dec 13 14:35:49.216729 ignition[1054]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:35:49.216729 ignition[1054]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:35:49.216729 ignition[1054]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:35:49.216729 ignition[1054]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:35:49.216729 ignition[1054]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:35:49.216729 ignition[1054]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:35:49.216729 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:35:49.216729 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:35:49.216729 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:35:49.354621 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1074) Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 14:35:49.354709 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem843006518" Dec 13 14:35:49.611678 ignition[1054]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem843006518": device or resource busy Dec 13 14:35:49.611678 ignition[1054]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem843006518", trying btrfs: device or resource busy Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem843006518" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem843006518" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem843006518" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem843006518" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:35:49.611678 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:35:49.793592 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:35:49.995680 ignition[1054]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:35:49.995680 ignition[1054]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:35:49.995680 ignition[1054]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:35:49.995680 ignition[1054]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Dec 13 14:35:49.995680 ignition[1054]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Dec 13 14:35:49.995680 ignition[1054]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(13): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(13): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(14): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(14): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:35:50.077611 ignition[1054]: INFO : files: files passed Dec 13 14:35:50.077611 ignition[1054]: INFO : POST message to Packet Timeline Dec 13 14:35:50.077611 ignition[1054]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 14:35:50.768778 ignition[1054]: INFO : GET result: OK Dec 13 14:35:51.090240 ignition[1054]: INFO : Ignition finished successfully Dec 13 14:35:51.093283 systemd[1]: Finished ignition-files.service. Dec 13 14:35:51.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.113175 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:35:51.185641 kernel: audit: type=1130 audit(1734100551.106:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.175615 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:35:51.209561 initrd-setup-root-after-ignition[1089]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:35:51.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.175931 systemd[1]: Starting ignition-quench.service... Dec 13 14:35:51.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.192761 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:35:51.219776 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:35:51.219839 systemd[1]: Finished ignition-quench.service. Dec 13 14:35:51.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.241707 systemd[1]: Reached target ignition-complete.target. Dec 13 14:35:51.258024 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:35:51.276732 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:35:51.276779 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:35:51.287614 systemd[1]: Reached target initrd-fs.target. Dec 13 14:35:51.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.302498 systemd[1]: Reached target initrd.target. Dec 13 14:35:51.316581 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:35:51.317486 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:35:51.340648 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:35:51.356901 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:35:51.384105 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:35:51.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.394857 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:35:51.412019 systemd[1]: Stopped target timers.target. Dec 13 14:35:51.427039 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:35:51.427419 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:35:51.442236 systemd[1]: Stopped target initrd.target. Dec 13 14:35:51.455926 systemd[1]: Stopped target basic.target. Dec 13 14:35:51.471931 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:35:51.487922 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:35:51.505928 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:35:51.520954 systemd[1]: Stopped target remote-fs.target. Dec 13 14:35:51.536940 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:35:51.552979 systemd[1]: Stopped target sysinit.target. Dec 13 14:35:51.711943 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:35:51.711959 kernel: audit: type=1131 audit(1734100551.630:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.568956 systemd[1]: Stopped target local-fs.target. Dec 13 14:35:51.584931 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:35:51.795425 kernel: audit: type=1131 audit(1734100551.736:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.601935 systemd[1]: Stopped target swap.target. Dec 13 14:35:51.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.615808 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:35:51.879555 kernel: audit: type=1131 audit(1734100551.803:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.616169 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:35:51.632144 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:35:51.721660 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:35:51.721756 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:35:51.737800 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:35:51.737924 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:35:51.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.804832 systemd[1]: Stopped target paths.target. Dec 13 14:35:52.093454 kernel: audit: type=1131 audit(1734100551.957:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.093471 kernel: audit: type=1131 audit(1734100552.034:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.870569 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:35:52.162842 kernel: audit: type=1131 audit(1734100552.100:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.874587 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:35:52.178610 ignition[1104]: INFO : Ignition 2.14.0 Dec 13 14:35:52.178610 ignition[1104]: INFO : Stage: umount Dec 13 14:35:52.178610 ignition[1104]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:35:52.178610 ignition[1104]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 14:35:52.178610 ignition[1104]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 14:35:52.178610 ignition[1104]: INFO : umount: umount passed Dec 13 14:35:52.178610 ignition[1104]: INFO : POST message to Packet Timeline Dec 13 14:35:52.178610 ignition[1104]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 14:35:52.517596 kernel: audit: type=1131 audit(1734100552.200:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.517614 kernel: audit: type=1131 audit(1734100552.286:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.517625 kernel: audit: type=1131 audit(1734100552.355:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.517632 kernel: audit: type=1131 audit(1734100552.422:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.879648 systemd[1]: Stopped target slices.target. Dec 13 14:35:52.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.906656 systemd[1]: Stopped target sockets.target. Dec 13 14:35:51.924645 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:35:51.924714 systemd[1]: Closed iscsid.socket. Dec 13 14:35:51.938733 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:35:51.938879 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:35:51.958944 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:35:51.959233 systemd[1]: Stopped ignition-files.service. Dec 13 14:35:52.035695 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:35:52.035773 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:35:52.102280 systemd[1]: Stopping ignition-mount.service... Dec 13 14:35:52.169715 systemd[1]: Stopping iscsiuio.service... Dec 13 14:35:52.185593 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:35:52.185664 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:35:52.202108 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:35:52.268568 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:35:52.268635 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:35:52.287548 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:35:52.287614 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:35:52.358219 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:35:52.358568 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:35:52.358617 systemd[1]: Stopped iscsiuio.service. Dec 13 14:35:52.423802 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:35:52.423844 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:35:52.491795 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:35:52.491838 systemd[1]: Closed iscsiuio.socket. Dec 13 14:35:52.507710 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:35:52.507748 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:35:53.293295 ignition[1104]: INFO : GET result: OK Dec 13 14:35:54.119660 ignition[1104]: INFO : Ignition finished successfully Dec 13 14:35:54.122253 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:35:54.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.122507 systemd[1]: Stopped ignition-mount.service. Dec 13 14:35:54.137043 systemd[1]: Stopped target network.target. Dec 13 14:35:54.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.153572 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:35:54.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.153818 systemd[1]: Stopped ignition-disks.service. Dec 13 14:35:54.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.169770 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:35:54.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.169897 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:35:54.184874 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:35:54.185025 systemd[1]: Stopped ignition-setup.service. Dec 13 14:35:54.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.200867 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:35:54.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.279000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:35:54.201018 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:35:54.218143 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:35:54.227505 systemd-networkd[881]: enp1s0f0np0: DHCPv6 lease lost Dec 13 14:35:54.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.232890 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:35:54.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.241542 systemd-networkd[881]: enp1s0f1np1: DHCPv6 lease lost Dec 13 14:35:54.350000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:35:54.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.247215 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:35:54.247475 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:35:54.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.265168 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:35:54.265507 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:35:54.279178 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:35:54.279272 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:35:54.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.297908 systemd[1]: Stopping network-cleanup.service... Dec 13 14:35:54.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.311501 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:35:54.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.311542 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:35:54.327656 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:35:54.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.327725 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:35:54.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.343903 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:35:54.344002 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:35:54.359997 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:35:54.378464 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:35:54.379975 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:35:54.380315 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:35:54.393308 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:35:54.393454 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:35:54.405709 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:35:54.405811 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:35:54.421573 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:35:54.421699 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:35:54.445627 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:35:54.445675 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:35:54.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:54.461570 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:35:54.461634 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:35:54.477983 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:35:54.494564 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:35:54.494595 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:35:54.508756 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:35:54.508810 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:35:54.642610 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:35:54.642856 systemd[1]: Stopped network-cleanup.service. Dec 13 14:35:54.767028 iscsid[902]: iscsid shutting down. Dec 13 14:35:54.652060 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:35:54.668463 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:35:54.709655 systemd[1]: Switching root. Dec 13 14:35:54.767139 systemd-journald[267]: Journal stopped Dec 13 14:35:58.846060 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Dec 13 14:35:58.846074 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:35:58.846083 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:35:58.846089 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:35:58.846094 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:35:58.846100 kernel: SELinux: policy capability open_perms=1 Dec 13 14:35:58.846106 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:35:58.846111 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:35:58.846117 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:35:58.846123 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:35:58.846128 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:35:58.846134 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:35:58.846140 systemd[1]: Successfully loaded SELinux policy in 314.782ms. Dec 13 14:35:58.846146 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.365ms. Dec 13 14:35:58.846155 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:35:58.846162 systemd[1]: Detected architecture x86-64. Dec 13 14:35:58.846168 systemd[1]: Detected first boot. Dec 13 14:35:58.846174 systemd[1]: Hostname set to . Dec 13 14:35:58.846181 systemd[1]: Initializing machine ID from random generator. Dec 13 14:35:58.846187 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:35:58.846193 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:35:58.846200 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:35:58.846207 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:35:58.846214 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:35:58.846220 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:35:58.846226 kernel: audit: type=1334 audit(1734100557.135:91): prog-id=12 op=LOAD Dec 13 14:35:58.846232 kernel: audit: type=1334 audit(1734100557.135:92): prog-id=3 op=UNLOAD Dec 13 14:35:58.846238 kernel: audit: type=1334 audit(1734100557.202:93): prog-id=13 op=LOAD Dec 13 14:35:58.846244 kernel: audit: type=1334 audit(1734100557.225:94): prog-id=14 op=LOAD Dec 13 14:35:58.846250 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:35:58.846256 kernel: audit: type=1334 audit(1734100557.225:95): prog-id=4 op=UNLOAD Dec 13 14:35:58.846262 kernel: audit: type=1334 audit(1734100557.225:96): prog-id=5 op=UNLOAD Dec 13 14:35:58.846268 kernel: audit: type=1131 audit(1734100557.225:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.846274 systemd[1]: Stopped iscsid.service. Dec 13 14:35:58.846280 kernel: audit: type=1131 audit(1734100557.387:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.846287 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:35:58.846293 kernel: audit: type=1334 audit(1734100557.457:99): prog-id=12 op=UNLOAD Dec 13 14:35:58.846299 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:35:58.846306 kernel: audit: type=1130 audit(1734100557.506:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.846312 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:35:58.846320 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:35:58.846327 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:35:58.846334 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:35:58.846341 systemd[1]: Created slice system-getty.slice. Dec 13 14:35:58.846350 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:35:58.846376 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:35:58.846400 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:35:58.846406 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:35:58.846413 systemd[1]: Created slice user.slice. Dec 13 14:35:58.846419 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:35:58.846426 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:35:58.846434 systemd[1]: Set up automount boot.automount. Dec 13 14:35:58.846440 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:35:58.846447 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:35:58.846453 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:35:58.846460 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:35:58.846466 systemd[1]: Reached target integritysetup.target. Dec 13 14:35:58.846473 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:35:58.846479 systemd[1]: Reached target remote-fs.target. Dec 13 14:35:58.846486 systemd[1]: Reached target slices.target. Dec 13 14:35:58.846493 systemd[1]: Reached target swap.target. Dec 13 14:35:58.846499 systemd[1]: Reached target torcx.target. Dec 13 14:35:58.846506 systemd[1]: Reached target veritysetup.target. Dec 13 14:35:58.846512 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:35:58.846519 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:35:58.846527 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:35:58.846534 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:35:58.846540 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:35:58.846547 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:35:58.846553 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:35:58.846560 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:35:58.846567 systemd[1]: Mounting media.mount... Dec 13 14:35:58.846574 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:58.846582 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:35:58.846588 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:35:58.846595 systemd[1]: Mounting tmp.mount... Dec 13 14:35:58.846602 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:35:58.846608 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:35:58.846615 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:35:58.846622 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:35:58.846628 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:35:58.846635 systemd[1]: Starting modprobe@drm.service... Dec 13 14:35:58.846642 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:35:58.846649 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:35:58.846656 kernel: fuse: init (API version 7.34) Dec 13 14:35:58.846662 systemd[1]: Starting modprobe@loop.service... Dec 13 14:35:58.846668 kernel: loop: module loaded Dec 13 14:35:58.846675 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:35:58.846682 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:35:58.846688 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:35:58.846695 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:35:58.846702 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:35:58.846710 systemd[1]: Stopped systemd-journald.service. Dec 13 14:35:58.846716 systemd[1]: Starting systemd-journald.service... Dec 13 14:35:58.846723 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:35:58.846732 systemd-journald[1256]: Journal started Dec 13 14:35:58.846757 systemd-journald[1256]: Runtime Journal (/run/log/journal/a0f8714c6bb3471fbc58cbca8ae6fe7e) is 8.0M, max 640.1M, 632.1M free. Dec 13 14:35:55.243000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:35:55.513000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:35:55.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:35:55.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:35:55.515000 audit: BPF prog-id=10 op=LOAD Dec 13 14:35:55.515000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:35:55.515000 audit: BPF prog-id=11 op=LOAD Dec 13 14:35:55.515000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:35:55.580000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:35:55.580000 audit[1146]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001278e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.580000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:35:55.607000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:35:55.607000 audit[1146]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001279b9 a2=1ed a3=0 items=2 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:55.607000 audit: CWD cwd="/" Dec 13 14:35:55.607000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:55.607000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:55.607000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:35:57.135000 audit: BPF prog-id=12 op=LOAD Dec 13 14:35:57.135000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:35:57.202000 audit: BPF prog-id=13 op=LOAD Dec 13 14:35:57.225000 audit: BPF prog-id=14 op=LOAD Dec 13 14:35:57.225000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:35:57.225000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:35:57.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:57.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:57.457000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:35:57.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:57.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.818000 audit: BPF prog-id=15 op=LOAD Dec 13 14:35:58.819000 audit: BPF prog-id=16 op=LOAD Dec 13 14:35:58.819000 audit: BPF prog-id=17 op=LOAD Dec 13 14:35:58.819000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:35:58.819000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:35:58.842000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:35:58.842000 audit[1256]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd5e471b80 a2=4000 a3=7ffd5e471c1c items=0 ppid=1 pid=1256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:58.842000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:35:55.580274 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:35:57.134939 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:35:55.580696 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:35:57.227029 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:35:55.580709 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:35:55.580729 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:35:55.580736 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:35:55.580755 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:35:55.580763 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:35:55.580892 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:35:55.580915 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:35:55.580923 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:35:55.581321 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:35:55.581346 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:35:55.581364 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:35:55.581374 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:35:55.581385 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:35:55.581394 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:35:56.777201 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:56.777344 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:56.777405 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:56.777499 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:35:56.777528 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:35:56.777561 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-12-13T14:35:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:35:58.878534 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:35:58.900382 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:35:58.922405 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:35:58.954870 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:35:58.954891 systemd[1]: Stopped verity-setup.service. Dec 13 14:35:58.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:58.989396 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:35:59.003389 systemd[1]: Started systemd-journald.service. Dec 13 14:35:59.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.011901 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:35:59.019633 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:35:59.026621 systemd[1]: Mounted media.mount. Dec 13 14:35:59.033604 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:35:59.042600 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:35:59.051583 systemd[1]: Mounted tmp.mount. Dec 13 14:35:59.058680 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:35:59.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.067706 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:35:59.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.076725 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:35:59.076855 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:35:59.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.085829 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:35:59.085996 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:35:59.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.095148 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:35:59.095402 systemd[1]: Finished modprobe@drm.service. Dec 13 14:35:59.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.104167 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:35:59.104557 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:35:59.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.113183 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:35:59.113555 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:35:59.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.122140 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:35:59.122570 systemd[1]: Finished modprobe@loop.service. Dec 13 14:35:59.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.131239 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:35:59.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.141174 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:35:59.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.151137 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:35:59.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.160125 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:35:59.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.169659 systemd[1]: Reached target network-pre.target. Dec 13 14:35:59.180088 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:35:59.190091 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:35:59.198542 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:35:59.202447 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:35:59.211942 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:35:59.220629 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:35:59.223049 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:35:59.223940 systemd-journald[1256]: Time spent on flushing to /var/log/journal/a0f8714c6bb3471fbc58cbca8ae6fe7e is 15.046ms for 1584 entries. Dec 13 14:35:59.223940 systemd-journald[1256]: System Journal (/var/log/journal/a0f8714c6bb3471fbc58cbca8ae6fe7e) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:35:59.258671 systemd-journald[1256]: Received client request to flush runtime journal. Dec 13 14:35:59.238499 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:35:59.238975 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:35:59.248929 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:35:59.255969 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:35:59.263517 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:35:59.271532 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:35:59.279584 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:35:59.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.287544 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:35:59.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.295546 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:35:59.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.303538 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:35:59.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.312528 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:35:59.320691 udevadm[1271]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:35:59.531836 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:35:59.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.541000 audit: BPF prog-id=18 op=LOAD Dec 13 14:35:59.541000 audit: BPF prog-id=19 op=LOAD Dec 13 14:35:59.541000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:35:59.541000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:35:59.543630 systemd[1]: Starting systemd-udevd.service... Dec 13 14:35:59.569788 systemd-udevd[1273]: Using default interface naming scheme 'v252'. Dec 13 14:35:59.589221 systemd[1]: Started systemd-udevd.service. Dec 13 14:35:59.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.599235 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 14:35:59.598000 audit: BPF prog-id=20 op=LOAD Dec 13 14:35:59.600451 systemd[1]: Starting systemd-networkd.service... Dec 13 14:35:59.621000 audit: BPF prog-id=21 op=LOAD Dec 13 14:35:59.621000 audit: BPF prog-id=22 op=LOAD Dec 13 14:35:59.621000 audit: BPF prog-id=23 op=LOAD Dec 13 14:35:59.623558 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:35:59.636171 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 14:35:59.636244 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:35:59.636260 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:35:59.636271 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 14:35:59.648358 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1345) Dec 13 14:35:59.693311 kernel: IPMI message handler: version 39.2 Dec 13 14:35:59.703398 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:35:59.706865 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:35:59.626000 audit[1341]: AVC avc: denied { confidentiality } for pid=1341 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:35:59.626000 audit[1341]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fed96bc9010 a1=4d98c a2=7fed98874bc5 a3=5 items=42 ppid=1273 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:59.626000 audit: CWD cwd="/" Dec 13 14:35:59.626000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=1 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=2 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=3 name=(null) inode=18924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=4 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=5 name=(null) inode=18925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=6 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=7 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=8 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=9 name=(null) inode=18927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=10 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=11 name=(null) inode=18928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=12 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=13 name=(null) inode=18929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=14 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=15 name=(null) inode=18930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=16 name=(null) inode=18926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=17 name=(null) inode=18931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=18 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=19 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=20 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=21 name=(null) inode=18933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=22 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=23 name=(null) inode=18934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=24 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=25 name=(null) inode=18935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=26 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=27 name=(null) inode=18936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=28 name=(null) inode=18932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=29 name=(null) inode=18937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=30 name=(null) inode=18923 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=31 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=32 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=33 name=(null) inode=18939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=34 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=35 name=(null) inode=18940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=36 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=37 name=(null) inode=18941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=38 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=39 name=(null) inode=18942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=40 name=(null) inode=18938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PATH item=41 name=(null) inode=18943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:59.626000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:35:59.734359 kernel: ipmi device interface Dec 13 14:35:59.754360 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 14:35:59.760500 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 14:35:59.780770 systemd[1]: Started systemd-userdbd.service. Dec 13 14:35:59.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:59.820354 kernel: ipmi_si: IPMI System Interface driver Dec 13 14:35:59.820398 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 14:35:59.854297 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 14:35:59.854313 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 14:35:59.854331 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 14:35:59.975816 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 14:35:59.975931 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 14:35:59.976052 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 14:35:59.976162 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 14:35:59.976250 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 14:35:59.976346 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 14:35:59.976403 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 14:36:00.013351 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 14:36:00.013397 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 14:36:00.093485 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 14:36:00.112022 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 14:36:00.112114 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 14:36:00.097383 systemd-networkd[1310]: bond0: netdev ready Dec 13 14:36:00.099999 systemd-networkd[1310]: lo: Link UP Dec 13 14:36:00.100002 systemd-networkd[1310]: lo: Gained carrier Dec 13 14:36:00.100560 systemd-networkd[1310]: Enumeration completed Dec 13 14:36:00.100621 systemd[1]: Started systemd-networkd.service. Dec 13 14:36:00.100887 systemd-networkd[1310]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 14:36:00.114727 systemd-networkd[1310]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7d.network. Dec 13 14:36:00.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.151380 kernel: intel_rapl_common: Found RAPL domain package Dec 13 14:36:00.151419 kernel: intel_rapl_common: Found RAPL domain core Dec 13 14:36:00.151432 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 14:36:00.168299 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 14:36:00.213353 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 14:36:00.216585 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:36:00.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.225039 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:36:00.240942 lvm[1376]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:36:00.266765 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:36:00.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.275484 systemd[1]: Reached target cryptsetup.target. Dec 13 14:36:00.283984 systemd[1]: Starting lvm2-activation.service... Dec 13 14:36:00.286073 lvm[1377]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:36:00.317780 systemd[1]: Finished lvm2-activation.service. Dec 13 14:36:00.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.326487 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:36:00.334438 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:36:00.334453 systemd[1]: Reached target local-fs.target. Dec 13 14:36:00.342445 systemd[1]: Reached target machines.target. Dec 13 14:36:00.351029 systemd[1]: Starting ldconfig.service... Dec 13 14:36:00.357760 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:36:00.357782 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:00.358296 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:36:00.365823 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:36:00.376987 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:36:00.377696 systemd[1]: Starting systemd-sysext.service... Dec 13 14:36:00.377942 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1379 (bootctl) Dec 13 14:36:00.378804 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:36:00.391679 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:36:00.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.392820 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:36:00.408382 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:36:00.408467 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:36:00.443352 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:36:00.517028 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:36:00.517336 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:36:00.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.552382 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:36:00.589998 systemd-fsck[1388]: fsck.fat 4.2 (2021-01-31) Dec 13 14:36:00.589998 systemd-fsck[1388]: /dev/sdb1: 789 files, 119291/258078 clusters Dec 13 14:36:00.590354 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:36:00.590751 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:36:00.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.602278 systemd[1]: Mounting boot.mount... Dec 13 14:36:00.606364 (sd-sysext)[1391]: Using extensions 'kubernetes'. Dec 13 14:36:00.606548 (sd-sysext)[1391]: Merged extensions into '/usr'. Dec 13 14:36:00.617703 systemd[1]: Mounted boot.mount. Dec 13 14:36:00.626408 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:36:00.627122 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:36:00.633533 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:36:00.634163 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:36:00.640974 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:36:00.647930 systemd[1]: Starting modprobe@loop.service... Dec 13 14:36:00.654452 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:36:00.654519 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:00.654584 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:36:00.656209 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:36:00.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.664636 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:36:00.676619 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:36:00.676692 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:36:00.683436 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 14:36:00.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.698658 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:36:00.698728 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:36:00.708398 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 14:36:00.709112 systemd-networkd[1310]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Dec 13 14:36:00.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.715651 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:36:00.715720 systemd[1]: Finished modprobe@loop.service. Dec 13 14:36:00.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.723700 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:36:00.723769 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:36:00.724338 systemd[1]: Finished systemd-sysext.service. Dec 13 14:36:00.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.742062 systemd[1]: Starting ensure-sysext.service... Dec 13 14:36:00.751390 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 14:36:00.757949 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:36:00.767569 systemd[1]: Reloading. Dec 13 14:36:00.768907 systemd-tmpfiles[1399]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:36:00.771908 systemd-tmpfiles[1399]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:36:00.778184 systemd-tmpfiles[1399]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:36:00.787946 /usr/lib/systemd/system-generators/torcx-generator[1418]: time="2024-12-13T14:36:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:00.787963 /usr/lib/systemd/system-generators/torcx-generator[1418]: time="2024-12-13T14:36:00Z" level=info msg="torcx already run" Dec 13 14:36:00.810732 ldconfig[1378]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:36:00.848626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:00.848634 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:00.862764 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:00.877357 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 14:36:00.877390 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 14:36:00.917397 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 14:36:00.917434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 14:36:00.933000 audit: BPF prog-id=24 op=LOAD Dec 13 14:36:00.933000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:36:00.934000 audit: BPF prog-id=25 op=LOAD Dec 13 14:36:00.934000 audit: BPF prog-id=26 op=LOAD Dec 13 14:36:00.934000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:36:00.934000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:36:00.936677 systemd-networkd[1310]: bond0: Link UP Dec 13 14:36:00.935000 audit: BPF prog-id=27 op=LOAD Dec 13 14:36:00.935000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:36:00.935000 audit: BPF prog-id=28 op=LOAD Dec 13 14:36:00.935000 audit: BPF prog-id=29 op=LOAD Dec 13 14:36:00.935000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:36:00.935000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:36:00.936888 systemd-networkd[1310]: enp1s0f1np1: Link UP Dec 13 14:36:00.937027 systemd-networkd[1310]: enp1s0f1np1: Gained carrier Dec 13 14:36:00.936000 audit: BPF prog-id=30 op=LOAD Dec 13 14:36:00.936000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:36:00.936000 audit: BPF prog-id=31 op=LOAD Dec 13 14:36:00.936000 audit: BPF prog-id=32 op=LOAD Dec 13 14:36:00.936000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:36:00.936000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:36:00.938017 systemd-networkd[1310]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Dec 13 14:36:00.938921 systemd[1]: Finished ldconfig.service. Dec 13 14:36:00.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.956030 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:36:00.961351 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 14:36:00.961396 kernel: bond0: active interface up! Dec 13 14:36:00.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:00.986767 systemd[1]: Starting audit-rules.service... Dec 13 14:36:01.002000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:36:01.002000 audit[1497]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd738e8ee0 a2=420 a3=0 items=0 ppid=1481 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:01.002000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:36:01.004183 augenrules[1497]: No rules Dec 13 14:36:01.006418 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 14:36:01.013099 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:36:01.022058 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:36:01.031432 systemd[1]: Starting systemd-resolved.service... Dec 13 14:36:01.039476 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:36:01.046973 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:36:01.053906 systemd[1]: Finished audit-rules.service. Dec 13 14:36:01.058471 systemd-networkd[1310]: enp1s0f0np0: Link UP Dec 13 14:36:01.058637 systemd-networkd[1310]: bond0: Gained carrier Dec 13 14:36:01.058725 systemd-networkd[1310]: enp1s0f0np0: Gained carrier Dec 13 14:36:01.060680 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:36:01.077635 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:36:01.085393 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 14:36:01.085423 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 14:36:01.122922 systemd-networkd[1310]: enp1s0f1np1: Link DOWN Dec 13 14:36:01.122926 systemd-networkd[1310]: enp1s0f1np1: Lost carrier Dec 13 14:36:01.123066 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:36:01.123353 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 14:36:01.131986 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.132666 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:36:01.139993 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:36:01.146950 systemd[1]: Starting modprobe@loop.service... Dec 13 14:36:01.152126 systemd-resolved[1504]: Positive Trust Anchors: Dec 13 14:36:01.152133 systemd-resolved[1504]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:36:01.152152 systemd-resolved[1504]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:36:01.153472 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.153545 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:01.154285 systemd[1]: Starting systemd-update-done.service... Dec 13 14:36:01.155912 systemd-resolved[1504]: Using system hostname 'ci-3510.3.6-a-3cae5c42ca'. Dec 13 14:36:01.161452 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:36:01.161937 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:36:01.170746 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:36:01.170815 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:36:01.179628 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:36:01.179690 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:36:01.187631 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:36:01.187693 systemd[1]: Finished modprobe@loop.service. Dec 13 14:36:01.195636 systemd[1]: Finished systemd-update-done.service. Dec 13 14:36:01.204769 systemd[1]: Reached target time-set.target. Dec 13 14:36:01.212585 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.213271 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:36:01.220978 systemd[1]: Starting modprobe@drm.service... Dec 13 14:36:01.227962 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:36:01.234939 systemd[1]: Starting modprobe@loop.service... Dec 13 14:36:01.241483 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.241550 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:01.242151 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:36:01.250475 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:36:01.251102 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:36:01.251166 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:36:01.259644 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:36:01.259703 systemd[1]: Finished modprobe@drm.service. Dec 13 14:36:01.267644 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:36:01.267702 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:36:01.281645 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:36:01.281704 systemd[1]: Finished modprobe@loop.service. Dec 13 14:36:01.286351 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 14:36:01.300722 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:36:01.300776 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.301281 systemd[1]: Finished ensure-sysext.service. Dec 13 14:36:01.307353 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Dec 13 14:36:01.309336 systemd-networkd[1310]: enp1s0f1np1: Link UP Dec 13 14:36:01.309569 systemd-networkd[1310]: enp1s0f1np1: Gained carrier Dec 13 14:36:01.315498 systemd[1]: Started systemd-resolved.service. Dec 13 14:36:01.323501 systemd[1]: Reached target network.target. Dec 13 14:36:01.338477 systemd[1]: Reached target nss-lookup.target. Dec 13 14:36:01.348353 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 14:36:01.364464 systemd[1]: Reached target sysinit.target. Dec 13 14:36:01.368353 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 14:36:01.376492 systemd[1]: Started motdgen.path. Dec 13 14:36:01.383459 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:36:01.393515 systemd[1]: Started logrotate.timer. Dec 13 14:36:01.400476 systemd[1]: Started mdadm.timer. Dec 13 14:36:01.407426 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:36:01.415423 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:36:01.415438 systemd[1]: Reached target paths.target. Dec 13 14:36:01.422417 systemd[1]: Reached target timers.target. Dec 13 14:36:01.429551 systemd[1]: Listening on dbus.socket. Dec 13 14:36:01.436909 systemd[1]: Starting docker.socket... Dec 13 14:36:01.444776 systemd[1]: Listening on sshd.socket. Dec 13 14:36:01.451493 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:01.452526 systemd[1]: Listening on docker.socket. Dec 13 14:36:01.459481 systemd[1]: Reached target sockets.target. Dec 13 14:36:01.467424 systemd[1]: Reached target basic.target. Dec 13 14:36:01.474442 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:36:01.474462 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.474476 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:36:01.474913 systemd[1]: Starting containerd.service... Dec 13 14:36:01.481851 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:36:01.490896 systemd[1]: Starting coreos-metadata.service... Dec 13 14:36:01.497944 systemd[1]: Starting dbus.service... Dec 13 14:36:01.503903 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:36:01.508514 jq[1527]: false Dec 13 14:36:01.510788 coreos-metadata[1520]: Dec 13 14:36:01.510 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 14:36:01.511224 systemd[1]: Starting extend-filesystems.service... Dec 13 14:36:01.517052 dbus-daemon[1526]: [system] SELinux support is enabled Dec 13 14:36:01.518468 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:36:01.519051 systemd[1]: Starting motdgen.service... Dec 13 14:36:01.519280 extend-filesystems[1529]: Found loop1 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sda Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb1 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb2 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb3 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found usr Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb4 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb6 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb7 Dec 13 14:36:01.539455 extend-filesystems[1529]: Found sdb9 Dec 13 14:36:01.539455 extend-filesystems[1529]: Checking size of /dev/sdb9 Dec 13 14:36:01.539455 extend-filesystems[1529]: Resized partition /dev/sdb9 Dec 13 14:36:01.711120 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Dec 13 14:36:01.526231 systemd[1]: Starting prepare-helm.service... Dec 13 14:36:01.711228 coreos-metadata[1523]: Dec 13 14:36:01.520 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 14:36:01.681215 dbus-daemon[1526]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:36:01.711389 extend-filesystems[1544]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:36:01.547692 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:36:01.565890 systemd[1]: Starting sshd-keygen.service... Dec 13 14:36:01.581813 systemd[1]: Starting systemd-logind.service... Dec 13 14:36:01.594391 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:36:01.595090 systemd[1]: Starting tcsd.service... Dec 13 14:36:01.725855 update_engine[1557]: I1213 14:36:01.661058 1557 main.cc:92] Flatcar Update Engine starting Dec 13 14:36:01.725855 update_engine[1557]: I1213 14:36:01.664562 1557 update_check_scheduler.cc:74] Next update check in 7m24s Dec 13 14:36:01.603547 systemd-logind[1555]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 14:36:01.726094 jq[1558]: true Dec 13 14:36:01.603557 systemd-logind[1555]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:36:01.603567 systemd-logind[1555]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 14:36:01.726265 tar[1560]: linux-amd64/helm Dec 13 14:36:01.603731 systemd-logind[1555]: New seat seat0. Dec 13 14:36:01.726422 jq[1562]: true Dec 13 14:36:01.613814 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.689754021Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.698246542Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.698517645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.699276261Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.1 Dec 13 14:36:01.726526 env[1563]: 73-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.699289202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700777407Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter Dec 13 14:36:01.726526 env[1563]: : skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700791289Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700801079Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700806977Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700845473Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726526 env[1563]: time="2024-12-13T14:36:01.700970435Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:36:01.614240 systemd[1]: Starting update-engine.service... Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.701042260Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.701051806Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.702518732Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.702527451Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713533689Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713547975Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713555607Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713576127Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713587472Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713595133Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713601708Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713609332Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.726927 env[1563]: time="2024-12-13T14:36:01.713616131Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.629030 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713623305Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713631965Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713644718Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713692002Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713745570Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713882359Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713900442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713908704Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713936735Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713948434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713957102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713963663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713970511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727175 env[1563]: time="2024-12-13T14:36:01.713976684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.643395 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.713982626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.713988382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714000220Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714062899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714076054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714084127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714090084Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714097376Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714103025Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714113450Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:36:01.727449 env[1563]: time="2024-12-13T14:36:01.714138255Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:36:01.727607 bash[1591]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:36:01.643792 systemd[1]: Started dbus.service. Dec 13 14:36:01.659256 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.714259573Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.714291961Z" level=info msg="Connect containerd service" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.714311446Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.714833133Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715075858Z" level=info msg="Start subscribing containerd event" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715107320Z" level=info msg="Start recovering state" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715147376Z" level=info msg="Start event monitor" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715160509Z" level=info msg="Start snapshots syncer" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715166118Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715170246Z" level=info msg="Start streaming server" Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715190702Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715242313Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:36:01.727703 env[1563]: time="2024-12-13T14:36:01.715268403Z" level=info msg="containerd successfully booted in 0.025844s" Dec 13 14:36:01.659391 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:36:01.659574 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:36:01.659651 systemd[1]: Finished motdgen.service. Dec 13 14:36:01.664929 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:36:01.665027 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:36:01.685820 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 14:36:01.685959 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 14:36:01.688124 systemd[1]: Started systemd-logind.service. Dec 13 14:36:01.704422 systemd[1]: Started update-engine.service. Dec 13 14:36:01.717475 systemd[1]: Started containerd.service. Dec 13 14:36:01.732716 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:36:01.744202 systemd[1]: Started locksmithd.service. Dec 13 14:36:01.751456 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:36:01.751537 systemd[1]: Reached target system-config.target. Dec 13 14:36:01.758537 sshd_keygen[1554]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:36:01.760449 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:36:01.760521 systemd[1]: Reached target user-config.target. Dec 13 14:36:01.770520 systemd[1]: Finished sshd-keygen.service. Dec 13 14:36:01.779200 systemd[1]: Starting issuegen.service... Dec 13 14:36:01.786570 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:36:01.786648 systemd[1]: Finished issuegen.service. Dec 13 14:36:01.795210 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:36:01.801781 locksmithd[1599]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:36:01.803639 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:36:01.812240 systemd[1]: Started getty@tty1.service. Dec 13 14:36:01.820163 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 14:36:01.828492 systemd[1]: Reached target getty.target. Dec 13 14:36:01.934552 tar[1560]: linux-amd64/LICENSE Dec 13 14:36:01.934552 tar[1560]: linux-amd64/README.md Dec 13 14:36:01.937099 systemd[1]: Finished prepare-helm.service. Dec 13 14:36:02.036354 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Dec 13 14:36:02.066679 extend-filesystems[1544]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Dec 13 14:36:02.066679 extend-filesystems[1544]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 14:36:02.066679 extend-filesystems[1544]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Dec 13 14:36:02.103453 extend-filesystems[1529]: Resized filesystem in /dev/sdb9 Dec 13 14:36:02.067002 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:36:02.067083 systemd[1]: Finished extend-filesystems.service. Dec 13 14:36:02.368434 systemd-networkd[1310]: bond0: Gained IPv6LL Dec 13 14:36:02.497725 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:36:02.507623 systemd[1]: Reached target network-online.target. Dec 13 14:36:02.516476 systemd[1]: Starting kubelet.service... Dec 13 14:36:03.144170 systemd[1]: Started kubelet.service. Dec 13 14:36:03.626426 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 14:36:03.724143 kubelet[1626]: E1213 14:36:03.724077 1626 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:03.725345 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:03.725420 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:06.525416 coreos-metadata[1523]: Dec 13 14:36:06.525 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Dec 13 14:36:06.526174 coreos-metadata[1520]: Dec 13 14:36:06.525 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Dec 13 14:36:06.841847 login[1619]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:36:06.848978 login[1618]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:36:06.850849 systemd-logind[1555]: New session 1 of user core. Dec 13 14:36:06.851425 systemd[1]: Created slice user-500.slice. Dec 13 14:36:06.851986 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:36:06.853283 systemd-logind[1555]: New session 2 of user core. Dec 13 14:36:06.857812 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:36:06.858514 systemd[1]: Starting user@500.service... Dec 13 14:36:06.860489 (systemd)[1647]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:07.031953 systemd[1647]: Queued start job for default target default.target. Dec 13 14:36:07.033291 systemd[1647]: Reached target paths.target. Dec 13 14:36:07.033375 systemd[1647]: Reached target sockets.target. Dec 13 14:36:07.033426 systemd[1647]: Reached target timers.target. Dec 13 14:36:07.033468 systemd[1647]: Reached target basic.target. Dec 13 14:36:07.033587 systemd[1647]: Reached target default.target. Dec 13 14:36:07.033670 systemd[1647]: Startup finished in 169ms. Dec 13 14:36:07.033779 systemd[1]: Started user@500.service. Dec 13 14:36:07.036594 systemd[1]: Started session-1.scope. Dec 13 14:36:07.038408 systemd[1]: Started session-2.scope. Dec 13 14:36:07.525937 coreos-metadata[1520]: Dec 13 14:36:07.525 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 14:36:07.526302 coreos-metadata[1523]: Dec 13 14:36:07.525 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 14:36:07.530510 coreos-metadata[1520]: Dec 13 14:36:07.530 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Dec 13 14:36:07.532005 coreos-metadata[1523]: Dec 13 14:36:07.531 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Dec 13 14:36:09.078703 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 14:36:09.078856 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 14:36:09.391543 systemd[1]: Created slice system-sshd.slice. Dec 13 14:36:09.392157 systemd[1]: Started sshd@0-147.28.180.89:22-139.178.89.65:57618.service. Dec 13 14:36:09.457508 sshd[1668]: Accepted publickey for core from 139.178.89.65 port 57618 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:09.460770 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:09.471525 systemd-logind[1555]: New session 3 of user core. Dec 13 14:36:09.473939 systemd[1]: Started session-3.scope. Dec 13 14:36:09.531005 coreos-metadata[1520]: Dec 13 14:36:09.530 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Dec 13 14:36:09.532217 coreos-metadata[1523]: Dec 13 14:36:09.532 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Dec 13 14:36:09.542925 systemd[1]: Started sshd@1-147.28.180.89:22-139.178.89.65:41020.service. Dec 13 14:36:09.576230 sshd[1673]: Accepted publickey for core from 139.178.89.65 port 41020 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:09.576948 sshd[1673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:09.579016 systemd-logind[1555]: New session 4 of user core. Dec 13 14:36:09.579555 systemd[1]: Started session-4.scope. Dec 13 14:36:09.630148 sshd[1673]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:09.632547 systemd[1]: sshd@1-147.28.180.89:22-139.178.89.65:41020.service: Deactivated successfully. Dec 13 14:36:09.633144 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:36:09.633800 systemd-logind[1555]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:36:09.634713 systemd[1]: Started sshd@2-147.28.180.89:22-139.178.89.65:41034.service. Dec 13 14:36:09.635486 systemd-logind[1555]: Removed session 4. Dec 13 14:36:09.671682 sshd[1679]: Accepted publickey for core from 139.178.89.65 port 41034 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:09.672600 sshd[1679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:09.675907 systemd-logind[1555]: New session 5 of user core. Dec 13 14:36:09.676549 systemd[1]: Started session-5.scope. Dec 13 14:36:09.731617 sshd[1679]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:09.732947 systemd[1]: sshd@2-147.28.180.89:22-139.178.89.65:41034.service: Deactivated successfully. Dec 13 14:36:09.733339 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:36:09.733749 systemd-logind[1555]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:36:09.734300 systemd-logind[1555]: Removed session 5. Dec 13 14:36:10.081885 coreos-metadata[1520]: Dec 13 14:36:10.081 INFO Fetch successful Dec 13 14:36:10.114057 unknown[1520]: wrote ssh authorized keys file for user: core Dec 13 14:36:10.127107 update-ssh-keys[1685]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:36:10.127323 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:36:10.509326 coreos-metadata[1523]: Dec 13 14:36:10.509 INFO Fetch successful Dec 13 14:36:10.549433 systemd[1]: Finished coreos-metadata.service. Dec 13 14:36:10.550180 systemd[1]: Started packet-phone-home.service. Dec 13 14:36:10.550285 systemd[1]: Reached target multi-user.target. Dec 13 14:36:10.551005 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:36:10.555537 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:36:10.555612 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:36:10.555753 curl[1688]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 14:36:10.555898 curl[1688]: Dload Upload Total Spent Left Speed Dec 13 14:36:10.555754 systemd[1]: Startup finished in 1.862s (kernel) + 22.061s (initrd) + 15.650s (userspace) = 39.575s. Dec 13 14:36:10.884492 curl[1688]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 14:36:10.886917 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 14:36:13.772933 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:36:13.773462 systemd[1]: Stopped kubelet.service. Dec 13 14:36:13.776733 systemd[1]: Starting kubelet.service... Dec 13 14:36:13.948621 systemd[1]: Started kubelet.service. Dec 13 14:36:13.988089 kubelet[1694]: E1213 14:36:13.988029 1694 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:13.990615 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:13.990696 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:19.741030 systemd[1]: Started sshd@3-147.28.180.89:22-139.178.89.65:42840.service. Dec 13 14:36:19.775443 sshd[1712]: Accepted publickey for core from 139.178.89.65 port 42840 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:19.776526 sshd[1712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:19.780122 systemd-logind[1555]: New session 6 of user core. Dec 13 14:36:19.780894 systemd[1]: Started session-6.scope. Dec 13 14:36:19.838793 sshd[1712]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:19.840304 systemd[1]: sshd@3-147.28.180.89:22-139.178.89.65:42840.service: Deactivated successfully. Dec 13 14:36:19.840621 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:36:19.840972 systemd-logind[1555]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:36:19.841472 systemd[1]: Started sshd@4-147.28.180.89:22-139.178.89.65:42854.service. Dec 13 14:36:19.841930 systemd-logind[1555]: Removed session 6. Dec 13 14:36:19.875965 sshd[1718]: Accepted publickey for core from 139.178.89.65 port 42854 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:19.877102 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:19.881140 systemd-logind[1555]: New session 7 of user core. Dec 13 14:36:19.882054 systemd[1]: Started session-7.scope. Dec 13 14:36:19.937732 sshd[1718]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:19.939218 systemd[1]: sshd@4-147.28.180.89:22-139.178.89.65:42854.service: Deactivated successfully. Dec 13 14:36:19.939553 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:36:19.939952 systemd-logind[1555]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:36:19.940451 systemd[1]: Started sshd@5-147.28.180.89:22-139.178.89.65:42860.service. Dec 13 14:36:19.940903 systemd-logind[1555]: Removed session 7. Dec 13 14:36:19.974661 sshd[1725]: Accepted publickey for core from 139.178.89.65 port 42860 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:19.975771 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:19.979436 systemd-logind[1555]: New session 8 of user core. Dec 13 14:36:19.980337 systemd[1]: Started session-8.scope. Dec 13 14:36:20.048333 sshd[1725]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:20.054765 systemd[1]: sshd@5-147.28.180.89:22-139.178.89.65:42860.service: Deactivated successfully. Dec 13 14:36:20.055345 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:36:20.055775 systemd-logind[1555]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:36:20.056204 systemd[1]: Started sshd@6-147.28.180.89:22-139.178.89.65:42862.service. Dec 13 14:36:20.056700 systemd-logind[1555]: Removed session 8. Dec 13 14:36:20.090212 sshd[1731]: Accepted publickey for core from 139.178.89.65 port 42862 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:20.091260 sshd[1731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:20.094809 systemd-logind[1555]: New session 9 of user core. Dec 13 14:36:20.095546 systemd[1]: Started session-9.scope. Dec 13 14:36:20.179787 sudo[1734]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:36:20.180466 sudo[1734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:20.202864 dbus-daemon[1526]: \xd0\u000d\xf1y%V: received setenforce notice (enforcing=661752256) Dec 13 14:36:20.207960 sudo[1734]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:20.213288 sshd[1731]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:20.220435 systemd[1]: sshd@6-147.28.180.89:22-139.178.89.65:42862.service: Deactivated successfully. Dec 13 14:36:20.222019 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:36:20.223784 systemd-logind[1555]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:36:20.226478 systemd[1]: Started sshd@7-147.28.180.89:22-139.178.89.65:42864.service. Dec 13 14:36:20.228936 systemd-logind[1555]: Removed session 9. Dec 13 14:36:20.286638 sshd[1738]: Accepted publickey for core from 139.178.89.65 port 42864 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:20.287248 sshd[1738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:20.289802 systemd-logind[1555]: New session 10 of user core. Dec 13 14:36:20.290238 systemd[1]: Started session-10.scope. Dec 13 14:36:20.344692 sudo[1742]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:36:20.344815 sudo[1742]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:20.346617 sudo[1742]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:20.348998 sudo[1741]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:36:20.349120 sudo[1741]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:20.354440 systemd[1]: Stopping audit-rules.service... Dec 13 14:36:20.353000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:20.355317 auditctl[1745]: No rules Dec 13 14:36:20.355493 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:36:20.355581 systemd[1]: Stopped audit-rules.service. Dec 13 14:36:20.356397 systemd[1]: Starting audit-rules.service... Dec 13 14:36:20.360834 kernel: kauditd_printk_skb: 132 callbacks suppressed Dec 13 14:36:20.360874 kernel: audit: type=1305 audit(1734100580.353:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:20.367298 augenrules[1762]: No rules Dec 13 14:36:20.367642 systemd[1]: Finished audit-rules.service. Dec 13 14:36:20.368119 sudo[1741]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:20.369033 sshd[1738]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:20.370806 systemd[1]: sshd@7-147.28.180.89:22-139.178.89.65:42864.service: Deactivated successfully. Dec 13 14:36:20.371183 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:36:20.371684 systemd-logind[1555]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:36:20.372273 systemd[1]: Started sshd@8-147.28.180.89:22-139.178.89.65:42880.service. Dec 13 14:36:20.372836 systemd-logind[1555]: Removed session 10. Dec 13 14:36:20.353000 audit[1745]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbc256a20 a2=420 a3=0 items=0 ppid=1 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.407428 kernel: audit: type=1300 audit(1734100580.353:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbc256a20 a2=420 a3=0 items=0 ppid=1 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.407470 kernel: audit: type=1327 audit(1734100580.353:184): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:20.353000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:20.416970 kernel: audit: type=1131 audit(1734100580.354:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.439440 kernel: audit: type=1130 audit(1734100580.366:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.445275 sshd[1768]: Accepted publickey for core from 139.178.89.65 port 42880 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:36:20.446677 sshd[1768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:20.448655 systemd-logind[1555]: New session 11 of user core. Dec 13 14:36:20.449115 systemd[1]: Started session-11.scope. Dec 13 14:36:20.461963 kernel: audit: type=1106 audit(1734100580.366:187): pid=1741 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.366000 audit[1741]: USER_END pid=1741 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.488004 kernel: audit: type=1104 audit(1734100580.366:188): pid=1741 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.366000 audit[1741]: CRED_DISP pid=1741 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.496473 sudo[1771]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:36:20.496592 sudo[1771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:20.508644 systemd[1]: Starting docker.service... Dec 13 14:36:20.511623 kernel: audit: type=1106 audit(1734100580.368:189): pid=1738 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.368000 audit[1738]: USER_END pid=1738 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.526117 env[1787]: time="2024-12-13T14:36:20.526091920Z" level=info msg="Starting up" Dec 13 14:36:20.526720 env[1787]: time="2024-12-13T14:36:20.526710249Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:36:20.526720 env[1787]: time="2024-12-13T14:36:20.526718952Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:36:20.526766 env[1787]: time="2024-12-13T14:36:20.526729761Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:36:20.526766 env[1787]: time="2024-12-13T14:36:20.526735927Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:36:20.527836 env[1787]: time="2024-12-13T14:36:20.527806067Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:36:20.527836 env[1787]: time="2024-12-13T14:36:20.527815226Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:36:20.527836 env[1787]: time="2024-12-13T14:36:20.527823322Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:36:20.527836 env[1787]: time="2024-12-13T14:36:20.527830790Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:36:20.543750 kernel: audit: type=1104 audit(1734100580.368:190): pid=1738 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.368000 audit[1738]: CRED_DISP pid=1738 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.569646 kernel: audit: type=1131 audit(1734100580.369:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.89:22-139.178.89.65:42864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.89:22-139.178.89.65:42864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.576540 env[1787]: time="2024-12-13T14:36:20.576528135Z" level=info msg="Loading containers: start." Dec 13 14:36:20.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.89:22-139.178.89.65:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.443000 audit[1768]: USER_ACCT pid=1768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.445000 audit[1768]: CRED_ACQ pid=1768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.445000 audit[1768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe0255520 a2=3 a3=0 items=0 ppid=1 pid=1768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:20.449000 audit[1768]: USER_START pid=1768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.450000 audit[1770]: CRED_ACQ pid=1770 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:20.495000 audit[1771]: USER_ACCT pid=1771 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.495000 audit[1771]: CRED_REFR pid=1771 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.496000 audit[1771]: USER_START pid=1771 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.624000 audit[1832]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.624000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe6ceb3520 a2=0 a3=7ffe6ceb350c items=0 ppid=1787 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.624000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:36:20.625000 audit[1834]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.625000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb3ef4de0 a2=0 a3=7ffeb3ef4dcc items=0 ppid=1787 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:36:20.625000 audit[1836]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.625000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff98307330 a2=0 a3=7fff9830731c items=0 ppid=1787 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:36:20.626000 audit[1838]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.626000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc28cee50 a2=0 a3=7ffcc28cee3c items=0 ppid=1787 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.626000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:36:20.628000 audit[1840]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.628000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4c141260 a2=0 a3=7ffc4c14124c items=0 ppid=1787 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.628000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:36:20.652000 audit[1845]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.652000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc42863c90 a2=0 a3=7ffc42863c7c items=0 ppid=1787 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:36:20.655000 audit[1847]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.655000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8e4be630 a2=0 a3=7fff8e4be61c items=0 ppid=1787 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:36:20.656000 audit[1849]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.656000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd7beeebe0 a2=0 a3=7ffd7beeebcc items=0 ppid=1787 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:36:20.657000 audit[1851]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.657000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffececfc610 a2=0 a3=7ffececfc5fc items=0 ppid=1787 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:20.661000 audit[1855]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.661000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe8f3cc0e0 a2=0 a3=7ffe8f3cc0cc items=0 ppid=1787 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:20.684000 audit[1856]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.684000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffe47c57f0 a2=0 a3=7fffe47c57dc items=0 ppid=1787 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:20.698402 kernel: Initializing XFRM netlink socket Dec 13 14:36:20.727674 env[1787]: time="2024-12-13T14:36:20.727626435Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:36:20.728517 systemd-timesyncd[1505]: Network configuration changed, trying to establish connection. Dec 13 14:36:20.739000 audit[1864]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.739000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeacab0f10 a2=0 a3=7ffeacab0efc items=0 ppid=1787 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:36:20.752000 audit[1867]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.752000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdcde62e60 a2=0 a3=7ffdcde62e4c items=0 ppid=1787 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:36:20.754000 audit[1870]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.754000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdff351ca0 a2=0 a3=7ffdff351c8c items=0 ppid=1787 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:36:20.755000 audit[1872]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.755000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffce2165a40 a2=0 a3=7ffce2165a2c items=0 ppid=1787 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:36:20.756000 audit[1874]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.756000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcf599e1a0 a2=0 a3=7ffcf599e18c items=0 ppid=1787 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:36:20.757000 audit[1876]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.757000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdcf070df0 a2=0 a3=7ffdcf070ddc items=0 ppid=1787 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:36:20.758000 audit[1878]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.758000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb2ebdb70 a2=0 a3=7ffcb2ebdb5c items=0 ppid=1787 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:36:20.764000 audit[1881]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.764000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd77266c50 a2=0 a3=7ffd77266c3c items=0 ppid=1787 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:36:20.765000 audit[1883]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.765000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdee7b9a40 a2=0 a3=7ffdee7b9a2c items=0 ppid=1787 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:36:20.766000 audit[1885]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.766000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff10e8ccf0 a2=0 a3=7fff10e8ccdc items=0 ppid=1787 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:36:20.767000 audit[1887]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.767000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0b89d3f0 a2=0 a3=7ffd0b89d3dc items=0 ppid=1787 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:36:20.769106 systemd-networkd[1310]: docker0: Link UP Dec 13 14:36:20.771000 audit[1891]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.771000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff53c71050 a2=0 a3=7fff53c7103c items=0 ppid=1787 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:20.785000 audit[1892]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:20.785000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdf7061e80 a2=0 a3=7ffdf7061e6c items=0 ppid=1787 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:20.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:20.787422 env[1787]: time="2024-12-13T14:36:20.787344800Z" level=info msg="Loading containers: done." Dec 13 14:36:20.796538 env[1787]: time="2024-12-13T14:36:20.796486522Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:36:20.796649 env[1787]: time="2024-12-13T14:36:20.796620820Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:36:20.796714 env[1787]: time="2024-12-13T14:36:20.796694726Z" level=info msg="Daemon has completed initialization" Dec 13 14:36:20.806551 systemd[1]: Started docker.service. Dec 13 14:36:20.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:20.813230 env[1787]: time="2024-12-13T14:36:20.813158556Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:36:21.080325 systemd-timesyncd[1505]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Dec 13 14:36:21.080382 systemd-timesyncd[1505]: Initial clock synchronization to Fri 2024-12-13 14:36:21.084275 UTC. Dec 13 14:36:21.987015 env[1563]: time="2024-12-13T14:36:21.986850470Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:36:22.839072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3550954611.mount: Deactivated successfully. Dec 13 14:36:24.021568 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:36:24.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.021704 systemd[1]: Stopped kubelet.service. Dec 13 14:36:24.022579 systemd[1]: Starting kubelet.service... Dec 13 14:36:24.179888 env[1563]: time="2024-12-13T14:36:24.179785826Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:24.182556 env[1563]: time="2024-12-13T14:36:24.182454528Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:24.199994 env[1563]: time="2024-12-13T14:36:24.199892437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:24.214049 systemd[1]: Started kubelet.service. Dec 13 14:36:24.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:24.218209 env[1563]: time="2024-12-13T14:36:24.218155345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:24.219259 env[1563]: time="2024-12-13T14:36:24.219207659Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:36:24.231053 env[1563]: time="2024-12-13T14:36:24.230992324Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:36:24.245877 kubelet[1954]: E1213 14:36:24.245777 1954 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:24.247059 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:24.247129 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:24.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:36:25.842742 env[1563]: time="2024-12-13T14:36:25.842714316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:25.843998 env[1563]: time="2024-12-13T14:36:25.843977917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:25.845162 env[1563]: time="2024-12-13T14:36:25.845150279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:25.846276 env[1563]: time="2024-12-13T14:36:25.846231415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:25.846828 env[1563]: time="2024-12-13T14:36:25.846786048Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:36:25.852653 env[1563]: time="2024-12-13T14:36:25.852592135Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:36:26.933319 env[1563]: time="2024-12-13T14:36:26.933271318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:26.933940 env[1563]: time="2024-12-13T14:36:26.933883782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:26.935396 env[1563]: time="2024-12-13T14:36:26.935345782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:26.936426 env[1563]: time="2024-12-13T14:36:26.936396545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:26.937375 env[1563]: time="2024-12-13T14:36:26.937312074Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:36:26.942819 env[1563]: time="2024-12-13T14:36:26.942777852Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:36:27.931097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4164714486.mount: Deactivated successfully. Dec 13 14:36:28.277118 env[1563]: time="2024-12-13T14:36:28.277075799Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.278214 env[1563]: time="2024-12-13T14:36:28.278180661Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.279271 env[1563]: time="2024-12-13T14:36:28.279231625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.280079 env[1563]: time="2024-12-13T14:36:28.280034581Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:28.280323 env[1563]: time="2024-12-13T14:36:28.280292313Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:36:28.287199 env[1563]: time="2024-12-13T14:36:28.287181562Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:36:28.892648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount227832966.mount: Deactivated successfully. Dec 13 14:36:29.595706 env[1563]: time="2024-12-13T14:36:29.595649348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:29.596308 env[1563]: time="2024-12-13T14:36:29.596245997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:29.597331 env[1563]: time="2024-12-13T14:36:29.597290720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:29.598259 env[1563]: time="2024-12-13T14:36:29.598215728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:29.599176 env[1563]: time="2024-12-13T14:36:29.599142443Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:36:29.604802 env[1563]: time="2024-12-13T14:36:29.604746729Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:36:30.138195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2403714063.mount: Deactivated successfully. Dec 13 14:36:30.139657 env[1563]: time="2024-12-13T14:36:30.139608139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.140208 env[1563]: time="2024-12-13T14:36:30.140168538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.140735 env[1563]: time="2024-12-13T14:36:30.140694911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.141694 env[1563]: time="2024-12-13T14:36:30.141654979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:30.141874 env[1563]: time="2024-12-13T14:36:30.141830871Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:36:30.147075 env[1563]: time="2024-12-13T14:36:30.147061289Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:36:30.697836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount119182155.mount: Deactivated successfully. Dec 13 14:36:32.336329 env[1563]: time="2024-12-13T14:36:32.336303163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.337601 env[1563]: time="2024-12-13T14:36:32.337557878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.338821 env[1563]: time="2024-12-13T14:36:32.338775223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.340448 env[1563]: time="2024-12-13T14:36:32.340372254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:32.340870 env[1563]: time="2024-12-13T14:36:32.340819166Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:36:34.098735 systemd[1]: Stopped kubelet.service. Dec 13 14:36:34.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.101086 systemd[1]: Starting kubelet.service... Dec 13 14:36:34.104458 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:36:34.104500 kernel: audit: type=1130 audit(1734100594.097:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.115183 systemd[1]: Reloading. Dec 13 14:36:34.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.155331 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-12-13T14:36:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:34.155345 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-12-13T14:36:34Z" level=info msg="torcx already run" Dec 13 14:36:34.181450 kernel: audit: type=1131 audit(1734100594.097:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.207608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:34.207615 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:34.218939 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.375198 kernel: audit: type=1400 audit(1734100594.264:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.375248 kernel: audit: type=1400 audit(1734100594.264:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.375263 kernel: audit: type=1400 audit(1734100594.264:234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.432435 kernel: audit: type=1400 audit(1734100594.264:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.490951 kernel: audit: type=1400 audit(1734100594.264:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551021 kernel: audit: type=1400 audit(1734100594.264:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.612434 kernel: audit: type=1400 audit(1734100594.264:238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.674779 kernel: audit: type=1400 audit(1734100594.264:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit: BPF prog-id=40 op=LOAD Dec 13 14:36:34.431000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.549000 audit: BPF prog-id=41 op=LOAD Dec 13 14:36:34.549000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit: BPF prog-id=42 op=LOAD Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit: BPF prog-id=43 op=LOAD Dec 13 14:36:34.736000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:36:34.736000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.736000 audit: BPF prog-id=44 op=LOAD Dec 13 14:36:34.737000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit: BPF prog-id=45 op=LOAD Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit: BPF prog-id=46 op=LOAD Dec 13 14:36:34.737000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:36:34.737000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.737000 audit: BPF prog-id=47 op=LOAD Dec 13 14:36:34.737000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit: BPF prog-id=48 op=LOAD Dec 13 14:36:34.738000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit: BPF prog-id=49 op=LOAD Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit: BPF prog-id=50 op=LOAD Dec 13 14:36:34.739000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:36:34.739000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.739000 audit: BPF prog-id=51 op=LOAD Dec 13 14:36:34.739000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit: BPF prog-id=52 op=LOAD Dec 13 14:36:34.740000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit: BPF prog-id=53 op=LOAD Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:34.740000 audit: BPF prog-id=54 op=LOAD Dec 13 14:36:34.740000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:36:34.740000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:36:34.745910 systemd[1]: Started kubelet.service. Dec 13 14:36:34.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.747858 systemd[1]: Stopping kubelet.service... Dec 13 14:36:34.748064 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:36:34.748145 systemd[1]: Stopped kubelet.service. Dec 13 14:36:34.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.748872 systemd[1]: Starting kubelet.service... Dec 13 14:36:34.928462 systemd[1]: Started kubelet.service. Dec 13 14:36:34.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.955198 kubelet[2221]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:34.955198 kubelet[2221]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:36:34.955198 kubelet[2221]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:34.955432 kubelet[2221]: I1213 14:36:34.955227 2221 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:36:35.124814 kubelet[2221]: I1213 14:36:35.124773 2221 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:36:35.124814 kubelet[2221]: I1213 14:36:35.124788 2221 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:36:35.124892 kubelet[2221]: I1213 14:36:35.124886 2221 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:36:35.138804 kubelet[2221]: E1213 14:36:35.138794 2221 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.28.180.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.140090 kubelet[2221]: I1213 14:36:35.140080 2221 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:35.164192 kubelet[2221]: I1213 14:36:35.164159 2221 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:36:35.164841 kubelet[2221]: I1213 14:36:35.164805 2221 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:36:35.164937 kubelet[2221]: I1213 14:36:35.164900 2221 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:36:35.164937 kubelet[2221]: I1213 14:36:35.164912 2221 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:36:35.164937 kubelet[2221]: I1213 14:36:35.164919 2221 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:36:35.165055 kubelet[2221]: I1213 14:36:35.164967 2221 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:35.165055 kubelet[2221]: I1213 14:36:35.165010 2221 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:36:35.165055 kubelet[2221]: I1213 14:36:35.165018 2221 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:36:35.165055 kubelet[2221]: I1213 14:36:35.165033 2221 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:36:35.165055 kubelet[2221]: I1213 14:36:35.165039 2221 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:36:35.166172 kubelet[2221]: I1213 14:36:35.166067 2221 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:36:35.166801 kubelet[2221]: W1213 14:36:35.166750 2221 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.28.180.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.166801 kubelet[2221]: E1213 14:36:35.166781 2221 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.28.180.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.171431 kubelet[2221]: W1213 14:36:35.171412 2221 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.28.180.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-3cae5c42ca&limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.171464 kubelet[2221]: E1213 14:36:35.171435 2221 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.28.180.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-3cae5c42ca&limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.172257 kubelet[2221]: I1213 14:36:35.172219 2221 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:36:35.172257 kubelet[2221]: W1213 14:36:35.172247 2221 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:36:35.172547 kubelet[2221]: I1213 14:36:35.172540 2221 server.go:1256] "Started kubelet" Dec 13 14:36:35.172633 kubelet[2221]: I1213 14:36:35.172623 2221 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:36:35.172716 kubelet[2221]: I1213 14:36:35.172663 2221 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:36:35.172788 kubelet[2221]: I1213 14:36:35.172780 2221 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:36:35.173225 kubelet[2221]: I1213 14:36:35.173217 2221 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:36:35.171000 audit[2221]: AVC avc: denied { mac_admin } for pid=2221 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:35.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:35.171000 audit[2221]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f32ae0 a1=c000f34660 a2=c000f32ab0 a3=25 items=0 ppid=1 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:35.171000 audit[2221]: AVC avc: denied { mac_admin } for pid=2221 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:35.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:35.171000 audit[2221]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f482a0 a1=c000f34678 a2=c000f32b70 a3=25 items=0 ppid=1 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:35.173495 kubelet[2221]: I1213 14:36:35.173235 2221 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:36:35.173495 kubelet[2221]: I1213 14:36:35.173270 2221 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:36:35.173495 kubelet[2221]: I1213 14:36:35.173293 2221 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:36:35.173495 kubelet[2221]: E1213 14:36:35.173329 2221 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-3cae5c42ca\" not found" Dec 13 14:36:35.194957 kubelet[2221]: I1213 14:36:35.194888 2221 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:36:35.195251 kubelet[2221]: I1213 14:36:35.195237 2221 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:36:35.195396 kubelet[2221]: I1213 14:36:35.195377 2221 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:36:35.195457 kubelet[2221]: I1213 14:36:35.195397 2221 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:36:35.195457 kubelet[2221]: E1213 14:36:35.195405 2221 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-3cae5c42ca?timeout=10s\": dial tcp 147.28.180.89:6443: connect: connection refused" interval="200ms" Dec 13 14:36:35.195457 kubelet[2221]: W1213 14:36:35.195389 2221 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.28.180.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.195457 kubelet[2221]: E1213 14:36:35.195444 2221 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.28.180.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.195633 kubelet[2221]: I1213 14:36:35.195496 2221 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:36:35.196452 kubelet[2221]: E1213 14:36:35.196437 2221 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:36:35.196508 kubelet[2221]: I1213 14:36:35.196454 2221 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:36:35.195000 audit[2244]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.195000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe7a562d00 a2=0 a3=7ffe7a562cec items=0 ppid=2221 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:35.196000 audit[2245]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.196000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc876eccc0 a2=0 a3=7ffc876eccac items=0 ppid=2221 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:36:35.197982 kubelet[2221]: E1213 14:36:35.197970 2221 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://147.28.180.89:6443/api/v1/namespaces/default/events\": dial tcp 147.28.180.89:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-3cae5c42ca.1810c34dbc0d5953 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-3cae5c42ca,UID:ci-3510.3.6-a-3cae5c42ca,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-3cae5c42ca,},FirstTimestamp:2024-12-13 14:36:35.172530515 +0000 UTC m=+0.242040080,LastTimestamp:2024-12-13 14:36:35.172530515 +0000 UTC m=+0.242040080,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-3cae5c42ca,}" Dec 13 14:36:35.197000 audit[2247]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.197000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd82eead10 a2=0 a3=7ffd82eeacfc items=0 ppid=2221 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:35.198000 audit[2249]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.198000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8ef253d0 a2=0 a3=7ffc8ef253bc items=0 ppid=2221 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:35.203000 audit[2252]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.203000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffce584de40 a2=0 a3=7ffce584de2c items=0 ppid=2221 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:36:35.205225 kubelet[2221]: I1213 14:36:35.205169 2221 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:36:35.204000 audit[2253]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:35.204000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde51f9a40 a2=0 a3=7ffde51f9a2c items=0 ppid=2221 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:35.205729 kubelet[2221]: I1213 14:36:35.205702 2221 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:36:35.205729 kubelet[2221]: I1213 14:36:35.205718 2221 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:36:35.204000 audit[2254]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.204000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9503fb30 a2=0 a3=7ffd9503fb1c items=0 ppid=2221 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:35.205898 kubelet[2221]: I1213 14:36:35.205730 2221 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:36:35.205898 kubelet[2221]: E1213 14:36:35.205785 2221 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:36:35.206053 kubelet[2221]: W1213 14:36:35.206024 2221 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://147.28.180.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.206093 kubelet[2221]: E1213 14:36:35.206060 2221 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.28.180.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:35.205000 audit[2257]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.205000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf1b0e00 a2=0 a3=7fffaf1b0dec items=0 ppid=2221 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:35.205000 audit[2256]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:35.205000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1e7daea0 a2=0 a3=10e3 items=0 ppid=2221 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:35.205000 audit[2258]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:35.205000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff85a48d90 a2=0 a3=7fff85a48d7c items=0 ppid=2221 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:35.207152 kubelet[2221]: I1213 14:36:35.207144 2221 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:36:35.207173 kubelet[2221]: I1213 14:36:35.207155 2221 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:36:35.207173 kubelet[2221]: I1213 14:36:35.207166 2221 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:35.205000 audit[2259]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:35.205000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcf6c860b0 a2=0 a3=7ffcf6c8609c items=0 ppid=2221 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:35.206000 audit[2260]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:35.206000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0362f5a0 a2=0 a3=7fff0362f58c items=0 ppid=2221 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:35.208023 kubelet[2221]: I1213 14:36:35.207993 2221 policy_none.go:49] "None policy: Start" Dec 13 14:36:35.208192 kubelet[2221]: I1213 14:36:35.208184 2221 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:36:35.208213 kubelet[2221]: I1213 14:36:35.208197 2221 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:36:35.211340 systemd[1]: Created slice kubepods.slice. Dec 13 14:36:35.213738 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:36:35.215382 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:36:35.230998 kubelet[2221]: I1213 14:36:35.230957 2221 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:36:35.230998 kubelet[2221]: I1213 14:36:35.230997 2221 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:36:35.229000 audit[2221]: AVC avc: denied { mac_admin } for pid=2221 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:35.229000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:35.229000 audit[2221]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001500de0 a1=c001218c00 a2=c001500db0 a3=25 items=0 ppid=1 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:35.229000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:35.231218 kubelet[2221]: I1213 14:36:35.231112 2221 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:36:35.231752 kubelet[2221]: E1213 14:36:35.231716 2221 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-3cae5c42ca\" not found" Dec 13 14:36:35.278538 kubelet[2221]: I1213 14:36:35.278436 2221 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.279278 kubelet[2221]: E1213 14:36:35.279203 2221 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.89:6443/api/v1/nodes\": dial tcp 147.28.180.89:6443: connect: connection refused" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.307075 kubelet[2221]: I1213 14:36:35.306967 2221 topology_manager.go:215] "Topology Admit Handler" podUID="5c89c67bf0160e52dbe9190fd95e89b5" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.310987 kubelet[2221]: I1213 14:36:35.310908 2221 topology_manager.go:215] "Topology Admit Handler" podUID="667ffa480c8200d1ae034390c777b906" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.314417 kubelet[2221]: I1213 14:36:35.314372 2221 topology_manager.go:215] "Topology Admit Handler" podUID="4f69d256a03aabeab4b4ced6a8429dc7" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.327256 systemd[1]: Created slice kubepods-burstable-pod5c89c67bf0160e52dbe9190fd95e89b5.slice. Dec 13 14:36:35.351038 systemd[1]: Created slice kubepods-burstable-pod667ffa480c8200d1ae034390c777b906.slice. Dec 13 14:36:35.376677 systemd[1]: Created slice kubepods-burstable-pod4f69d256a03aabeab4b4ced6a8429dc7.slice. Dec 13 14:36:35.396304 kubelet[2221]: E1213 14:36:35.396218 2221 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-3cae5c42ca?timeout=10s\": dial tcp 147.28.180.89:6443: connect: connection refused" interval="400ms" Dec 13 14:36:35.486737 kubelet[2221]: I1213 14:36:35.486542 2221 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.487378 kubelet[2221]: E1213 14:36:35.487284 2221 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.89:6443/api/v1/nodes\": dial tcp 147.28.180.89:6443: connect: connection refused" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.495856 kubelet[2221]: I1213 14:36:35.495755 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f69d256a03aabeab4b4ced6a8429dc7-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-3cae5c42ca\" (UID: \"4f69d256a03aabeab4b4ced6a8429dc7\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.495856 kubelet[2221]: I1213 14:36:35.495860 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496177 kubelet[2221]: I1213 14:36:35.496023 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496177 kubelet[2221]: I1213 14:36:35.496121 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496426 kubelet[2221]: I1213 14:36:35.496190 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496426 kubelet[2221]: I1213 14:36:35.496256 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496426 kubelet[2221]: I1213 14:36:35.496407 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496728 kubelet[2221]: I1213 14:36:35.496549 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.496728 kubelet[2221]: I1213 14:36:35.496656 2221 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.646687 env[1563]: time="2024-12-13T14:36:35.646559827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-3cae5c42ca,Uid:5c89c67bf0160e52dbe9190fd95e89b5,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:35.675061 env[1563]: time="2024-12-13T14:36:35.674936703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-3cae5c42ca,Uid:667ffa480c8200d1ae034390c777b906,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:35.682132 env[1563]: time="2024-12-13T14:36:35.682050800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-3cae5c42ca,Uid:4f69d256a03aabeab4b4ced6a8429dc7,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:35.797995 kubelet[2221]: E1213 14:36:35.797900 2221 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-3cae5c42ca?timeout=10s\": dial tcp 147.28.180.89:6443: connect: connection refused" interval="800ms" Dec 13 14:36:35.875744 systemd[1]: Started sshd@9-147.28.180.89:22-218.92.0.231:62160.service. Dec 13 14:36:35.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.89:22-218.92.0.231:62160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:35.889776 kubelet[2221]: I1213 14:36:35.889740 2221 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:35.890005 kubelet[2221]: E1213 14:36:35.889965 2221 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.89:6443/api/v1/nodes\": dial tcp 147.28.180.89:6443: connect: connection refused" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:36.204210 env[1563]: time="2024-12-13T14:36:36.204081362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.204573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3992604278.mount: Deactivated successfully. Dec 13 14:36:36.205492 env[1563]: time="2024-12-13T14:36:36.205441789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.206004 env[1563]: time="2024-12-13T14:36:36.205949515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.206830 env[1563]: time="2024-12-13T14:36:36.206790299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.207333 env[1563]: time="2024-12-13T14:36:36.207313980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.208658 env[1563]: time="2024-12-13T14:36:36.208623454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.210437 env[1563]: time="2024-12-13T14:36:36.210407276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.211822 env[1563]: time="2024-12-13T14:36:36.211767295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.212863 env[1563]: time="2024-12-13T14:36:36.212849159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.213209 env[1563]: time="2024-12-13T14:36:36.213198035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.213732 env[1563]: time="2024-12-13T14:36:36.213691488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.214093 env[1563]: time="2024-12-13T14:36:36.214054007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.217805 env[1563]: time="2024-12-13T14:36:36.217772361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:36.217805 env[1563]: time="2024-12-13T14:36:36.217793434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:36.217805 env[1563]: time="2024-12-13T14:36:36.217800187Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:36.217963 env[1563]: time="2024-12-13T14:36:36.217862040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/808d218ec9486a112f06a11a0cb80519e85e5d44db6521248774d2f9e2067479 pid=2276 runtime=io.containerd.runc.v2 Dec 13 14:36:36.218558 env[1563]: time="2024-12-13T14:36:36.218533825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:36.218558 env[1563]: time="2024-12-13T14:36:36.218550668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:36.218643 env[1563]: time="2024-12-13T14:36:36.218559247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:36.218672 env[1563]: time="2024-12-13T14:36:36.218649945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/315138bff7997c5846da615f9b5f51344274f49af64748fec385b617245f3568 pid=2285 runtime=io.containerd.runc.v2 Dec 13 14:36:36.219976 env[1563]: time="2024-12-13T14:36:36.219941760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:36.219976 env[1563]: time="2024-12-13T14:36:36.219962929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:36.219976 env[1563]: time="2024-12-13T14:36:36.219970385Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:36.220096 env[1563]: time="2024-12-13T14:36:36.220054344Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bafdd17cf0027d19fab5b5d2e47833dc50745a620486bb30fd99e1822a760ce pid=2307 runtime=io.containerd.runc.v2 Dec 13 14:36:36.227213 systemd[1]: Started cri-containerd-315138bff7997c5846da615f9b5f51344274f49af64748fec385b617245f3568.scope. Dec 13 14:36:36.227881 systemd[1]: Started cri-containerd-808d218ec9486a112f06a11a0cb80519e85e5d44db6521248774d2f9e2067479.scope. Dec 13 14:36:36.228484 systemd[1]: Started cri-containerd-8bafdd17cf0027d19fab5b5d2e47833dc50745a620486bb30fd99e1822a760ce.scope. Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit: BPF prog-id=55 op=LOAD Dec 13 14:36:36.233000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2307 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616664643137636630303237643139666162356235643265343738 Dec 13 14:36:36.233000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.233000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2307 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616664643137636630303237643139666162356235643265343738 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=56 op=LOAD Dec 13 14:36:36.234000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000281280 items=0 ppid=2307 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616664643137636630303237643139666162356235643265343738 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=57 op=LOAD Dec 13 14:36:36.234000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002812c8 items=0 ppid=2307 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616664643137636630303237643139666162356235643265343738 Dec 13 14:36:36.234000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=58 op=LOAD Dec 13 14:36:36.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=59 op=LOAD Dec 13 14:36:36.234000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002816d8 items=0 ppid=2307 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862616664643137636630303237643139666162356235643265343738 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2285 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353133386266663739393763353834366461363135663962356635 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2285 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353133386266663739393763353834366461363135663962356635 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=60 op=LOAD Dec 13 14:36:36.234000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c000216d40 items=0 ppid=2285 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353133386266663739393763353834366461363135663962356635 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=61 op=LOAD Dec 13 14:36:36.234000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c000216d88 items=0 ppid=2285 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353133386266663739393763353834366461363135663962356635 Dec 13 14:36:36.234000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:36:36.234000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.234000 audit: BPF prog-id=62 op=LOAD Dec 13 14:36:36.234000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c000217198 items=0 ppid=2285 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353133386266663739393763353834366461363135663962356635 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit: BPF prog-id=63 op=LOAD Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2276 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386432313865633934383661313132663036613131613063623830 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=2276 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386432313865633934383661313132663036613131613063623830 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit: BPF prog-id=64 op=LOAD Dec 13 14:36:36.235000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c0003e4340 items=0 ppid=2276 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386432313865633934383661313132663036613131613063623830 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit: BPF prog-id=65 op=LOAD Dec 13 14:36:36.235000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c0003e4388 items=0 ppid=2276 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386432313865633934383661313132663036613131613063623830 Dec 13 14:36:36.235000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:36:36.235000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { perfmon } for pid=2304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit[2304]: AVC avc: denied { bpf } for pid=2304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.235000 audit: BPF prog-id=66 op=LOAD Dec 13 14:36:36.235000 audit[2304]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c0003e4798 items=0 ppid=2276 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386432313865633934383661313132663036613131613063623830 Dec 13 14:36:36.251185 env[1563]: time="2024-12-13T14:36:36.251159241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-3cae5c42ca,Uid:4f69d256a03aabeab4b4ced6a8429dc7,Namespace:kube-system,Attempt:0,} returns sandbox id \"8bafdd17cf0027d19fab5b5d2e47833dc50745a620486bb30fd99e1822a760ce\"" Dec 13 14:36:36.252941 env[1563]: time="2024-12-13T14:36:36.252926143Z" level=info msg="CreateContainer within sandbox \"8bafdd17cf0027d19fab5b5d2e47833dc50745a620486bb30fd99e1822a760ce\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:36:36.257749 env[1563]: time="2024-12-13T14:36:36.257722506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-3cae5c42ca,Uid:667ffa480c8200d1ae034390c777b906,Namespace:kube-system,Attempt:0,} returns sandbox id \"315138bff7997c5846da615f9b5f51344274f49af64748fec385b617245f3568\"" Dec 13 14:36:36.257837 env[1563]: time="2024-12-13T14:36:36.257791334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-3cae5c42ca,Uid:5c89c67bf0160e52dbe9190fd95e89b5,Namespace:kube-system,Attempt:0,} returns sandbox id \"808d218ec9486a112f06a11a0cb80519e85e5d44db6521248774d2f9e2067479\"" Dec 13 14:36:36.258186 env[1563]: time="2024-12-13T14:36:36.258169697Z" level=info msg="CreateContainer within sandbox \"8bafdd17cf0027d19fab5b5d2e47833dc50745a620486bb30fd99e1822a760ce\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"30fb41ece31dc3ee82a2ed5882453e79a99646a1b171295d09cd6b00a5407855\"" Dec 13 14:36:36.258433 env[1563]: time="2024-12-13T14:36:36.258414330Z" level=info msg="StartContainer for \"30fb41ece31dc3ee82a2ed5882453e79a99646a1b171295d09cd6b00a5407855\"" Dec 13 14:36:36.258885 env[1563]: time="2024-12-13T14:36:36.258873031Z" level=info msg="CreateContainer within sandbox \"315138bff7997c5846da615f9b5f51344274f49af64748fec385b617245f3568\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:36:36.258972 env[1563]: time="2024-12-13T14:36:36.258959344Z" level=info msg="CreateContainer within sandbox \"808d218ec9486a112f06a11a0cb80519e85e5d44db6521248774d2f9e2067479\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:36:36.263527 env[1563]: time="2024-12-13T14:36:36.263503931Z" level=info msg="CreateContainer within sandbox \"315138bff7997c5846da615f9b5f51344274f49af64748fec385b617245f3568\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"22921f0da39d5a90886e3736f8bf241437971beda59936d64f6f4d87f73c98ea\"" Dec 13 14:36:36.263766 env[1563]: time="2024-12-13T14:36:36.263750012Z" level=info msg="StartContainer for \"22921f0da39d5a90886e3736f8bf241437971beda59936d64f6f4d87f73c98ea\"" Dec 13 14:36:36.264343 env[1563]: time="2024-12-13T14:36:36.264328361Z" level=info msg="CreateContainer within sandbox \"808d218ec9486a112f06a11a0cb80519e85e5d44db6521248774d2f9e2067479\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3b1379875c72f26a343c87f107fda063a62c36a44d72ff940dd820f0b25b5097\"" Dec 13 14:36:36.264540 env[1563]: time="2024-12-13T14:36:36.264525024Z" level=info msg="StartContainer for \"3b1379875c72f26a343c87f107fda063a62c36a44d72ff940dd820f0b25b5097\"" Dec 13 14:36:36.266818 systemd[1]: Started cri-containerd-30fb41ece31dc3ee82a2ed5882453e79a99646a1b171295d09cd6b00a5407855.scope. Dec 13 14:36:36.272667 systemd[1]: Started cri-containerd-22921f0da39d5a90886e3736f8bf241437971beda59936d64f6f4d87f73c98ea.scope. Dec 13 14:36:36.273148 systemd[1]: Started cri-containerd-3b1379875c72f26a343c87f107fda063a62c36a44d72ff940dd820f0b25b5097.scope. Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit: BPF prog-id=67 op=LOAD Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2307 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666234316563653331646333656538326132656435383832343533 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2307 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666234316563653331646333656538326132656435383832343533 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit: BPF prog-id=68 op=LOAD Dec 13 14:36:36.274000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300cc0 items=0 ppid=2307 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666234316563653331646333656538326132656435383832343533 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit: BPF prog-id=69 op=LOAD Dec 13 14:36:36.274000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300d08 items=0 ppid=2307 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666234316563653331646333656538326132656435383832343533 Dec 13 14:36:36.274000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:36:36.274000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.274000 audit: BPF prog-id=70 op=LOAD Dec 13 14:36:36.274000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000301118 items=0 ppid=2307 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330666234316563653331646333656538326132656435383832343533 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit: BPF prog-id=71 op=LOAD Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2276 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313337393837356337326632366133343363383766313037666461 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2276 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313337393837356337326632366133343363383766313037666461 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit: BPF prog-id=72 op=LOAD Dec 13 14:36:36.278000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca8d0 items=0 ppid=2276 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313337393837356337326632366133343363383766313037666461 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit: BPF prog-id=73 op=LOAD Dec 13 14:36:36.278000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca918 items=0 ppid=2276 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313337393837356337326632366133343363383766313037666461 Dec 13 14:36:36.278000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:36:36.278000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.278000 audit: BPF prog-id=74 op=LOAD Dec 13 14:36:36.278000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cad28 items=0 ppid=2276 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313337393837356337326632366133343363383766313037666461 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit: BPF prog-id=75 op=LOAD Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2285 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393231663064613339643561393038383665333733366638626632 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2285 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393231663064613339643561393038383665333733366638626632 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit: BPF prog-id=76 op=LOAD Dec 13 14:36:36.279000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325ac0 items=0 ppid=2285 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393231663064613339643561393038383665333733366638626632 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit: BPF prog-id=77 op=LOAD Dec 13 14:36:36.279000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325b08 items=0 ppid=2285 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393231663064613339643561393038383665333733366638626632 Dec 13 14:36:36.279000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:36:36.279000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:36.279000 audit: BPF prog-id=78 op=LOAD Dec 13 14:36:36.279000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325f18 items=0 ppid=2285 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:36.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393231663064613339643561393038383665333733366638626632 Dec 13 14:36:36.291678 env[1563]: time="2024-12-13T14:36:36.291646488Z" level=info msg="StartContainer for \"30fb41ece31dc3ee82a2ed5882453e79a99646a1b171295d09cd6b00a5407855\" returns successfully" Dec 13 14:36:36.295885 env[1563]: time="2024-12-13T14:36:36.295856243Z" level=info msg="StartContainer for \"3b1379875c72f26a343c87f107fda063a62c36a44d72ff940dd820f0b25b5097\" returns successfully" Dec 13 14:36:36.296247 env[1563]: time="2024-12-13T14:36:36.296228244Z" level=info msg="StartContainer for \"22921f0da39d5a90886e3736f8bf241437971beda59936d64f6f4d87f73c98ea\" returns successfully" Dec 13 14:36:36.300735 kubelet[2221]: W1213 14:36:36.300672 2221 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.28.180.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:36.300735 kubelet[2221]: E1213 14:36:36.300711 2221 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.28.180.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.89:6443: connect: connection refused Dec 13 14:36:36.672000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.672000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.672000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000908000 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:36.672000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005208c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:36.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:36.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:36.691183 kubelet[2221]: I1213 14:36:36.691168 2221 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0045526f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005c40020 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00608e000 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c006388000 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c004ff0140 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c004552ab0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:36:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:36.822773 kubelet[2221]: I1213 14:36:36.822756 2221 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:36.875686 kubelet[2221]: E1213 14:36:36.875659 2221 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="1.6s" Dec 13 14:36:37.165463 kubelet[2221]: I1213 14:36:37.165386 2221 apiserver.go:52] "Watching apiserver" Dec 13 14:36:37.195960 kubelet[2221]: I1213 14:36:37.195844 2221 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:36:37.223438 kubelet[2221]: E1213 14:36:37.223372 2221 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.6-a-3cae5c42ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:37.223722 kubelet[2221]: E1213 14:36:37.223478 2221 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:37.223869 kubelet[2221]: E1213 14:36:37.223810 2221 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:38.235380 kubelet[2221]: W1213 14:36:38.235294 2221 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:36:38.290154 sshd[2265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:36:38.290000 audit[2265]: USER_AUTH pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:39.464000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.510989 kernel: kauditd_printk_skb: 583 callbacks suppressed Dec 13 14:36:39.511084 kernel: audit: type=1400 audit(1734100599.464:540): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.464000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f45880 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:39.720443 kernel: audit: type=1300 audit(1734100599.464:540): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f45880 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:39.720505 kernel: audit: type=1327 audit(1734100599.464:540): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:39.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:39.815101 kernel: audit: type=1400 audit(1734100599.465:541): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.465000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.904816 kernel: audit: type=1300 audit(1734100599.465:541): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f458c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:39.465000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f458c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:40.026267 kernel: audit: type=1327 audit(1734100599.465:541): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:39.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:40.065044 systemd[1]: Reloading. Dec 13 14:36:40.104321 /usr/lib/systemd/system-generators/torcx-generator[2556]: time="2024-12-13T14:36:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:40.104381 /usr/lib/systemd/system-generators/torcx-generator[2556]: time="2024-12-13T14:36:40Z" level=info msg="torcx already run" Dec 13 14:36:39.466000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.466000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ead5a0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:39.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:39.467000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:39.467000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e7bfe0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:39.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:40.119421 kernel: audit: type=1400 audit(1734100599.466:542): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:40.119453 kernel: audit: type=1300 audit(1734100599.466:542): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ead5a0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:40.119469 kernel: audit: type=1327 audit(1734100599.466:542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:40.119481 kernel: audit: type=1400 audit(1734100599.467:543): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:40.532852 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:40.532860 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:40.544043 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.596000 audit: BPF prog-id=79 op=LOAD Dec 13 14:36:40.596000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.597000 audit: BPF prog-id=80 op=LOAD Dec 13 14:36:40.597000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit: BPF prog-id=81 op=LOAD Dec 13 14:36:40.598000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.598000 audit: BPF prog-id=82 op=LOAD Dec 13 14:36:40.598000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.599000 audit: BPF prog-id=83 op=LOAD Dec 13 14:36:40.599000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.600000 audit: BPF prog-id=84 op=LOAD Dec 13 14:36:40.600000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit: BPF prog-id=85 op=LOAD Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.601000 audit: BPF prog-id=86 op=LOAD Dec 13 14:36:40.601000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:36:40.601000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit: BPF prog-id=87 op=LOAD Dec 13 14:36:40.602000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit: BPF prog-id=88 op=LOAD Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit: BPF prog-id=89 op=LOAD Dec 13 14:36:40.602000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:36:40.602000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit: BPF prog-id=90 op=LOAD Dec 13 14:36:40.603000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit: BPF prog-id=91 op=LOAD Dec 13 14:36:40.603000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.603000 audit: BPF prog-id=92 op=LOAD Dec 13 14:36:40.603000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit: BPF prog-id=93 op=LOAD Dec 13 14:36:40.604000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit: BPF prog-id=94 op=LOAD Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.604000 audit: BPF prog-id=95 op=LOAD Dec 13 14:36:40.605000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:36:40.605000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit: BPF prog-id=96 op=LOAD Dec 13 14:36:40.605000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.605000 audit: BPF prog-id=97 op=LOAD Dec 13 14:36:40.605000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit: BPF prog-id=98 op=LOAD Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.606000 audit: BPF prog-id=99 op=LOAD Dec 13 14:36:40.606000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:36:40.606000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:36:40.612913 kubelet[2221]: I1213 14:36:40.612896 2221 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:40.612913 systemd[1]: Stopping kubelet.service... Dec 13 14:36:40.631772 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:36:40.631872 systemd[1]: Stopped kubelet.service. Dec 13 14:36:40.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:40.632805 systemd[1]: Starting kubelet.service... Dec 13 14:36:40.802566 sshd[2265]: Failed password for root from 218.92.0.231 port 62160 ssh2 Dec 13 14:36:40.816828 systemd[1]: Started kubelet.service. Dec 13 14:36:40.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:40.840904 kubelet[2621]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:40.840904 kubelet[2621]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:36:40.840904 kubelet[2621]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:40.841208 kubelet[2621]: I1213 14:36:40.840947 2621 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:36:40.843925 kubelet[2621]: I1213 14:36:40.843915 2621 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:36:40.843925 kubelet[2621]: I1213 14:36:40.843925 2621 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:36:40.844062 kubelet[2621]: I1213 14:36:40.844056 2621 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:36:40.844866 kubelet[2621]: I1213 14:36:40.844850 2621 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:36:40.846958 kubelet[2621]: I1213 14:36:40.846929 2621 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:40.866138 kubelet[2621]: I1213 14:36:40.866120 2621 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:36:40.866247 kubelet[2621]: I1213 14:36:40.866241 2621 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:36:40.866352 kubelet[2621]: I1213 14:36:40.866343 2621 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:36:40.866413 kubelet[2621]: I1213 14:36:40.866359 2621 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:36:40.866413 kubelet[2621]: I1213 14:36:40.866365 2621 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:36:40.866413 kubelet[2621]: I1213 14:36:40.866383 2621 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:40.866468 kubelet[2621]: I1213 14:36:40.866439 2621 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:36:40.866468 kubelet[2621]: I1213 14:36:40.866448 2621 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:36:40.866468 kubelet[2621]: I1213 14:36:40.866462 2621 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:36:40.866519 kubelet[2621]: I1213 14:36:40.866470 2621 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:36:40.866794 kubelet[2621]: I1213 14:36:40.866786 2621 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:36:40.866913 kubelet[2621]: I1213 14:36:40.866904 2621 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:36:40.867320 kubelet[2621]: I1213 14:36:40.867307 2621 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:36:40.867444 kubelet[2621]: I1213 14:36:40.867192 2621 server.go:1256] "Started kubelet" Dec 13 14:36:40.867481 kubelet[2621]: I1213 14:36:40.867473 2621 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:36:40.867900 kubelet[2621]: I1213 14:36:40.867585 2621 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:36:40.867000 audit[2621]: AVC avc: denied { mac_admin } for pid=2621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.867000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:40.867000 audit[2621]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cda480 a1=c0011a44e0 a2=c000cda450 a3=25 items=0 ppid=1 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:40.867000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:40.867000 audit[2621]: AVC avc: denied { mac_admin } for pid=2621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.867000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:40.867000 audit[2621]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00118a420 a1=c0011a44f8 a2=c000cda510 a3=25 items=0 ppid=1 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:40.867000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868839 2621 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868846 2621 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868877 2621 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868898 2621 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:36:40.869142 kubelet[2621]: E1213 14:36:40.868899 2621 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868929 2621 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.868948 2621 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:36:40.869142 kubelet[2621]: E1213 14:36:40.868985 2621 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-3cae5c42ca\" not found" Dec 13 14:36:40.869142 kubelet[2621]: I1213 14:36:40.869079 2621 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:36:40.869389 kubelet[2621]: I1213 14:36:40.869370 2621 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:36:40.869429 kubelet[2621]: I1213 14:36:40.869418 2621 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:36:40.869918 kubelet[2621]: I1213 14:36:40.869908 2621 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:36:40.874002 kubelet[2621]: I1213 14:36:40.873985 2621 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:36:40.874509 kubelet[2621]: I1213 14:36:40.874502 2621 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:36:40.874549 kubelet[2621]: I1213 14:36:40.874516 2621 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:36:40.874549 kubelet[2621]: I1213 14:36:40.874527 2621 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:36:40.874605 kubelet[2621]: E1213 14:36:40.874552 2621 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:36:40.884821 kubelet[2621]: I1213 14:36:40.884806 2621 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:36:40.884821 kubelet[2621]: I1213 14:36:40.884819 2621 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:36:40.884920 kubelet[2621]: I1213 14:36:40.884828 2621 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:40.884920 kubelet[2621]: I1213 14:36:40.884910 2621 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:36:40.884964 kubelet[2621]: I1213 14:36:40.884923 2621 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:36:40.884964 kubelet[2621]: I1213 14:36:40.884927 2621 policy_none.go:49] "None policy: Start" Dec 13 14:36:40.885168 kubelet[2621]: I1213 14:36:40.885163 2621 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:36:40.885195 kubelet[2621]: I1213 14:36:40.885171 2621 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:36:40.885244 kubelet[2621]: I1213 14:36:40.885239 2621 state_mem.go:75] "Updated machine memory state" Dec 13 14:36:40.887185 kubelet[2621]: I1213 14:36:40.887149 2621 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:36:40.887185 kubelet[2621]: I1213 14:36:40.887176 2621 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:36:40.885000 audit[2621]: AVC avc: denied { mac_admin } for pid=2621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:40.885000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:40.885000 audit[2621]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010e21b0 a1=c000f2ad68 a2=c0010e2180 a3=25 items=0 ppid=1 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:40.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:40.887391 kubelet[2621]: I1213 14:36:40.887294 2621 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:36:40.972033 kubelet[2621]: I1213 14:36:40.972004 2621 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.975081 kubelet[2621]: I1213 14:36:40.975066 2621 topology_manager.go:215] "Topology Admit Handler" podUID="4f69d256a03aabeab4b4ced6a8429dc7" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.975153 kubelet[2621]: I1213 14:36:40.975111 2621 topology_manager.go:215] "Topology Admit Handler" podUID="5c89c67bf0160e52dbe9190fd95e89b5" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.975153 kubelet[2621]: I1213 14:36:40.975133 2621 topology_manager.go:215] "Topology Admit Handler" podUID="667ffa480c8200d1ae034390c777b906" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.979009 kubelet[2621]: W1213 14:36:40.978990 2621 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:36:40.979088 kubelet[2621]: W1213 14:36:40.978991 2621 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:36:40.979135 kubelet[2621]: W1213 14:36:40.979126 2621 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:36:40.979183 kubelet[2621]: I1213 14:36:40.979176 2621 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.979209 kubelet[2621]: E1213 14:36:40.979184 2621 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:40.979232 kubelet[2621]: I1213 14:36:40.979213 2621 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070531 kubelet[2621]: I1213 14:36:41.070443 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070531 kubelet[2621]: I1213 14:36:41.070478 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070531 kubelet[2621]: I1213 14:36:41.070506 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070531 kubelet[2621]: I1213 14:36:41.070524 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070706 kubelet[2621]: I1213 14:36:41.070542 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070706 kubelet[2621]: I1213 14:36:41.070577 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/667ffa480c8200d1ae034390c777b906-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-3cae5c42ca\" (UID: \"667ffa480c8200d1ae034390c777b906\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070706 kubelet[2621]: I1213 14:36:41.070627 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f69d256a03aabeab4b4ced6a8429dc7-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-3cae5c42ca\" (UID: \"4f69d256a03aabeab4b4ced6a8429dc7\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070706 kubelet[2621]: I1213 14:36:41.070655 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.070706 kubelet[2621]: I1213 14:36:41.070691 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5c89c67bf0160e52dbe9190fd95e89b5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" (UID: \"5c89c67bf0160e52dbe9190fd95e89b5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.867451 kubelet[2621]: I1213 14:36:41.867402 2621 apiserver.go:52] "Watching apiserver" Dec 13 14:36:41.869977 kubelet[2621]: I1213 14:36:41.869938 2621 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:36:41.884697 kubelet[2621]: W1213 14:36:41.884680 2621 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:36:41.884796 kubelet[2621]: E1213 14:36:41.884719 2621 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-3cae5c42ca\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" Dec 13 14:36:41.903498 kubelet[2621]: I1213 14:36:41.903463 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-3cae5c42ca" podStartSLOduration=3.903415056 podStartE2EDuration="3.903415056s" podCreationTimestamp="2024-12-13 14:36:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:41.903377574 +0000 UTC m=+1.083827041" watchObservedRunningTime="2024-12-13 14:36:41.903415056 +0000 UTC m=+1.083864522" Dec 13 14:36:41.909098 kubelet[2621]: I1213 14:36:41.909076 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-3cae5c42ca" podStartSLOduration=1.9090398899999999 podStartE2EDuration="1.90903989s" podCreationTimestamp="2024-12-13 14:36:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:41.90890607 +0000 UTC m=+1.089355540" watchObservedRunningTime="2024-12-13 14:36:41.90903989 +0000 UTC m=+1.089489361" Dec 13 14:36:41.918900 kubelet[2621]: I1213 14:36:41.918855 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-3cae5c42ca" podStartSLOduration=1.918831892 podStartE2EDuration="1.918831892s" podCreationTimestamp="2024-12-13 14:36:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:41.913691503 +0000 UTC m=+1.094140967" watchObservedRunningTime="2024-12-13 14:36:41.918831892 +0000 UTC m=+1.099281355" Dec 13 14:36:42.274000 audit[2265]: USER_AUTH pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:44.005616 sshd[2265]: Failed password for root from 218.92.0.231 port 62160 ssh2 Dec 13 14:36:44.353000 audit[2265]: USER_AUTH pid=2265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:44.379336 sudo[1771]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:44.378000 audit[1771]: USER_END pid=1771 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:44.378000 audit[1771]: CRED_DISP pid=1771 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:44.382211 sshd[1768]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:44.383000 audit[1768]: USER_END pid=1768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:44.383000 audit[1768]: CRED_DISP pid=1768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:36:44.388181 systemd[1]: sshd@8-147.28.180.89:22-139.178.89.65:42880.service: Deactivated successfully. Dec 13 14:36:44.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.89:22-139.178.89.65:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:44.390031 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:36:44.390442 systemd[1]: session-11.scope: Consumed 2.943s CPU time. Dec 13 14:36:44.391836 systemd-logind[1555]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:36:44.394093 systemd-logind[1555]: Removed session 11. Dec 13 14:36:46.025018 sshd[2265]: Failed password for root from 218.92.0.231 port 62160 ssh2 Dec 13 14:36:46.434117 sshd[2265]: Received disconnect from 218.92.0.231 port 62160:11: [preauth] Dec 13 14:36:46.434117 sshd[2265]: Disconnected from authenticating user root 218.92.0.231 port 62160 [preauth] Dec 13 14:36:46.434669 sshd[2265]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:36:46.436767 systemd[1]: sshd@9-147.28.180.89:22-218.92.0.231:62160.service: Deactivated successfully. Dec 13 14:36:46.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.89:22-218.92.0.231:62160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.464974 kernel: kauditd_printk_skb: 267 callbacks suppressed Dec 13 14:36:46.465013 kernel: audit: type=1131 audit(1734100606.436:800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.89:22-218.92.0.231:62160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.589307 systemd[1]: Started sshd@10-147.28.180.89:22-218.92.0.231:14096.service. Dec 13 14:36:46.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.89:22-218.92.0.231:14096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.678355 kernel: audit: type=1130 audit(1734100606.588:801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.89:22-218.92.0.231:14096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.983841 update_engine[1557]: I1213 14:36:46.983739 1557 update_attempter.cc:509] Updating boot flags... Dec 13 14:36:48.095429 sshd[2779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:36:48.094000 audit[2779]: USER_AUTH pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:48.192541 kernel: audit: type=1100 audit(1734100608.094:802): pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:49.981337 sshd[2779]: Failed password for root from 218.92.0.231 port 14096 ssh2 Dec 13 14:36:50.583000 audit[2779]: ANOM_LOGIN_FAILURES pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:50.584417 sshd[2779]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 14:36:50.584000 audit[2779]: USER_AUTH pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:50.746111 kernel: audit: type=2100 audit(1734100610.583:803): pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:50.746171 kernel: audit: type=1100 audit(1734100610.584:804): pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:52.040000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=8280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:36:52.040000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014da580 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:52.208581 kubelet[2621]: I1213 14:36:52.208539 2621 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:36:52.208796 env[1563]: time="2024-12-13T14:36:52.208719066Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:36:52.208911 kubelet[2621]: I1213 14:36:52.208799 2621 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:36:52.254519 kernel: audit: type=1400 audit(1734100612.040:805): avc: denied { watch } for pid=2445 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=8280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:36:52.254574 kernel: audit: type=1300 audit(1734100612.040:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014da580 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:36:52.254591 kernel: audit: type=1327 audit(1734100612.040:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:52.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:52.995096 kubelet[2621]: I1213 14:36:52.995036 2621 topology_manager.go:215] "Topology Admit Handler" podUID="59a5f6ca-b17f-428a-8c5b-e41715f2d4cb" podNamespace="kube-system" podName="kube-proxy-bvb4k" Dec 13 14:36:53.009055 systemd[1]: Created slice kubepods-besteffort-pod59a5f6ca_b17f_428a_8c5b_e41715f2d4cb.slice. Dec 13 14:36:53.051875 kubelet[2621]: I1213 14:36:53.051806 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/59a5f6ca-b17f-428a-8c5b-e41715f2d4cb-kube-proxy\") pod \"kube-proxy-bvb4k\" (UID: \"59a5f6ca-b17f-428a-8c5b-e41715f2d4cb\") " pod="kube-system/kube-proxy-bvb4k" Dec 13 14:36:53.052202 kubelet[2621]: I1213 14:36:53.052054 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/59a5f6ca-b17f-428a-8c5b-e41715f2d4cb-lib-modules\") pod \"kube-proxy-bvb4k\" (UID: \"59a5f6ca-b17f-428a-8c5b-e41715f2d4cb\") " pod="kube-system/kube-proxy-bvb4k" Dec 13 14:36:53.052440 kubelet[2621]: I1213 14:36:53.052205 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mfq2s\" (UniqueName: \"kubernetes.io/projected/59a5f6ca-b17f-428a-8c5b-e41715f2d4cb-kube-api-access-mfq2s\") pod \"kube-proxy-bvb4k\" (UID: \"59a5f6ca-b17f-428a-8c5b-e41715f2d4cb\") " pod="kube-system/kube-proxy-bvb4k" Dec 13 14:36:53.052613 kubelet[2621]: I1213 14:36:53.052436 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/59a5f6ca-b17f-428a-8c5b-e41715f2d4cb-xtables-lock\") pod \"kube-proxy-bvb4k\" (UID: \"59a5f6ca-b17f-428a-8c5b-e41715f2d4cb\") " pod="kube-system/kube-proxy-bvb4k" Dec 13 14:36:53.076526 sshd[2779]: Failed password for root from 218.92.0.231 port 14096 ssh2 Dec 13 14:36:53.326819 env[1563]: time="2024-12-13T14:36:53.326675187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bvb4k,Uid:59a5f6ca-b17f-428a-8c5b-e41715f2d4cb,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:53.337493 kubelet[2621]: I1213 14:36:53.337387 2621 topology_manager.go:215] "Topology Admit Handler" podUID="e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-lhsqf" Dec 13 14:36:53.350342 env[1563]: time="2024-12-13T14:36:53.350209343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:53.350342 env[1563]: time="2024-12-13T14:36:53.350278942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:53.350342 env[1563]: time="2024-12-13T14:36:53.350309746Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:53.350893 env[1563]: time="2024-12-13T14:36:53.350778444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b54f6267e83bd805f745055fa9f8e8e0ba17173853cdabf1a722b30c9185120 pid=2806 runtime=io.containerd.runc.v2 Dec 13 14:36:53.355562 kubelet[2621]: I1213 14:36:53.355496 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa-var-lib-calico\") pod \"tigera-operator-c7ccbd65-lhsqf\" (UID: \"e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa\") " pod="tigera-operator/tigera-operator-c7ccbd65-lhsqf" Dec 13 14:36:53.355711 kubelet[2621]: I1213 14:36:53.355610 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hpd29\" (UniqueName: \"kubernetes.io/projected/e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa-kube-api-access-hpd29\") pod \"tigera-operator-c7ccbd65-lhsqf\" (UID: \"e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa\") " pod="tigera-operator/tigera-operator-c7ccbd65-lhsqf" Dec 13 14:36:53.360728 systemd[1]: Created slice kubepods-besteffort-pode42d7db6_cffa_4dd8_8df2_be0b2fa5eafa.slice. Dec 13 14:36:53.368217 systemd[1]: Started cri-containerd-4b54f6267e83bd805f745055fa9f8e8e0ba17173853cdabf1a722b30c9185120.scope. Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.501685 kernel: audit: type=1400 audit(1734100613.374:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.501724 kernel: audit: type=1400 audit(1734100613.374:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.501741 kernel: audit: type=1400 audit(1734100613.374:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628909 kernel: audit: type=1400 audit(1734100613.374:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628942 kernel: audit: type=1400 audit(1734100613.374:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.667542 env[1563]: time="2024-12-13T14:36:53.667524149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-lhsqf,Uid:e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:36:53.674592 env[1563]: time="2024-12-13T14:36:53.674560097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:53.674592 env[1563]: time="2024-12-13T14:36:53.674580701Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:53.674592 env[1563]: time="2024-12-13T14:36:53.674589470Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:53.674766 env[1563]: time="2024-12-13T14:36:53.674710224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96d912b77af76a8dd61eb341cbc908ca59fe5ee6d8a9088034f60faabed069bc pid=2842 runtime=io.containerd.runc.v2 Dec 13 14:36:53.680850 systemd[1]: Started cri-containerd-96d912b77af76a8dd61eb341cbc908ca59fe5ee6d8a9088034f60faabed069bc.scope. Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.756841 kernel: audit: type=1400 audit(1734100613.374:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.756905 kernel: audit: type=1400 audit(1734100613.374:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.564000 audit: BPF prog-id=100 op=LOAD Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2806 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462353466363236376538336264383035663734353035356661396638 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2806 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462353466363236376538336264383035663734353035356661396638 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.565000 audit: BPF prog-id=101 op=LOAD Dec 13 14:36:53.565000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ce260 items=0 ppid=2806 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462353466363236376538336264383035663734353035356661396638 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.692000 audit: BPF prog-id=102 op=LOAD Dec 13 14:36:53.692000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000185ce8 items=0 ppid=2806 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462353466363236376538336264383035663734353035356661396638 Dec 13 14:36:53.820000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:36:53.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit: BPF prog-id=103 op=LOAD Dec 13 14:36:53.820000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit: BPF prog-id=104 op=LOAD Dec 13 14:36:53.820000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b60f8 items=0 ppid=2806 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462353466363236376538336264383035663734353035356661396638 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2842 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643931326237376166373661386464363165623334316362633930 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2842 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643931326237376166373661386464363165623334316362633930 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit: BPF prog-id=105 op=LOAD Dec 13 14:36:53.820000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000284ca0 items=0 ppid=2842 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643931326237376166373661386464363165623334316362633930 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit: BPF prog-id=106 op=LOAD Dec 13 14:36:53.820000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284ce8 items=0 ppid=2842 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643931326237376166373661386464363165623334316362633930 Dec 13 14:36:53.820000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:36:53.820000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.820000 audit: BPF prog-id=107 op=LOAD Dec 13 14:36:53.820000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002850f8 items=0 ppid=2842 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936643931326237376166373661386464363165623334316362633930 Dec 13 14:36:53.825424 env[1563]: time="2024-12-13T14:36:53.825373473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bvb4k,Uid:59a5f6ca-b17f-428a-8c5b-e41715f2d4cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"4b54f6267e83bd805f745055fa9f8e8e0ba17173853cdabf1a722b30c9185120\"" Dec 13 14:36:53.826655 env[1563]: time="2024-12-13T14:36:53.826609244Z" level=info msg="CreateContainer within sandbox \"4b54f6267e83bd805f745055fa9f8e8e0ba17173853cdabf1a722b30c9185120\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:36:53.832188 env[1563]: time="2024-12-13T14:36:53.832142822Z" level=info msg="CreateContainer within sandbox \"4b54f6267e83bd805f745055fa9f8e8e0ba17173853cdabf1a722b30c9185120\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"99d99c0d204798393b7f8111e23575eb20a6310fad5f402e42e92597a64ee5df\"" Dec 13 14:36:53.832421 env[1563]: time="2024-12-13T14:36:53.832405810Z" level=info msg="StartContainer for \"99d99c0d204798393b7f8111e23575eb20a6310fad5f402e42e92597a64ee5df\"" Dec 13 14:36:53.837963 env[1563]: time="2024-12-13T14:36:53.837937322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-lhsqf,Uid:e42d7db6-cffa-4dd8-8df2-be0b2fa5eafa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"96d912b77af76a8dd61eb341cbc908ca59fe5ee6d8a9088034f60faabed069bc\"" Dec 13 14:36:53.838829 env[1563]: time="2024-12-13T14:36:53.838816295Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:36:53.841031 systemd[1]: Started cri-containerd-99d99c0d204798393b7f8111e23575eb20a6310fad5f402e42e92597a64ee5df.scope. Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8af4f682c8 items=0 ppid=2806 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643939633064323034373938333933623766383131316532333537 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit: BPF prog-id=108 op=LOAD Dec 13 14:36:53.848000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=2806 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643939633064323034373938333933623766383131316532333537 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit: BPF prog-id=109 op=LOAD Dec 13 14:36:53.848000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=2806 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643939633064323034373938333933623766383131316532333537 Dec 13 14:36:53.848000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:36:53.848000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.848000 audit: BPF prog-id=110 op=LOAD Dec 13 14:36:53.848000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=2806 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939643939633064323034373938333933623766383131316532333537 Dec 13 14:36:53.854532 env[1563]: time="2024-12-13T14:36:53.854510315Z" level=info msg="StartContainer for \"99d99c0d204798393b7f8111e23575eb20a6310fad5f402e42e92597a64ee5df\" returns successfully" Dec 13 14:36:53.882000 audit[2948]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:53.882000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4113e940 a2=0 a3=7ffd4113e92c items=0 ppid=2897 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:36:53.883000 audit[2949]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:53.883000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4c58ea60 a2=0 a3=7ffc4c58ea4c items=0 ppid=2897 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:36:53.883000 audit[2951]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:53.883000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca8f84f0 a2=0 a3=7fffca8f84dc items=0 ppid=2897 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:36:53.883000 audit[2952]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:53.883000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca06bf050 a2=0 a3=7ffca06bf03c items=0 ppid=2897 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:36:53.884000 audit[2953]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:53.884000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd568ab660 a2=0 a3=7ffd568ab64c items=0 ppid=2897 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:36:53.884000 audit[2954]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:53.884000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd880d8200 a2=0 a3=7ffd880d81ec items=0 ppid=2897 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:36:53.910558 kubelet[2621]: I1213 14:36:53.910539 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-bvb4k" podStartSLOduration=1.910507652 podStartE2EDuration="1.910507652s" podCreationTimestamp="2024-12-13 14:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:53.910473162 +0000 UTC m=+13.090922632" watchObservedRunningTime="2024-12-13 14:36:53.910507652 +0000 UTC m=+13.090957117" Dec 13 14:36:53.986000 audit[2955]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:53.986000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7a30e630 a2=0 a3=7ffe7a30e61c items=0 ppid=2897 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:36:53.993000 audit[2957]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:53.993000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd88040e50 a2=0 a3=7ffd88040e3c items=0 ppid=2897 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:53.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:36:54.003000 audit[2960]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.003000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe08683ae0 a2=0 a3=7ffe08683acc items=0 ppid=2897 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:36:54.006000 audit[2961]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.006000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd894d3870 a2=0 a3=7ffd894d385c items=0 ppid=2897 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:36:54.012000 audit[2963]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.012000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2fadf8a0 a2=0 a3=7ffd2fadf88c items=0 ppid=2897 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:36:54.015000 audit[2964]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.015000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc04612b00 a2=0 a3=7ffc04612aec items=0 ppid=2897 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:36:54.022000 audit[2966]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.022000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff60786b80 a2=0 a3=7fff60786b6c items=0 ppid=2897 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:36:54.032000 audit[2969]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.032000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe688d2490 a2=0 a3=7ffe688d247c items=0 ppid=2897 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:36:54.035000 audit[2970]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.035000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed0aecc70 a2=0 a3=7ffed0aecc5c items=0 ppid=2897 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:36:54.042000 audit[2972]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.042000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe07b85ed0 a2=0 a3=7ffe07b85ebc items=0 ppid=2897 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:36:54.045000 audit[2973]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.045000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd6358310 a2=0 a3=7fffd63582fc items=0 ppid=2897 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:36:54.052000 audit[2975]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.052000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe19d00b30 a2=0 a3=7ffe19d00b1c items=0 ppid=2897 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:54.062000 audit[2978]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.062000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff884edbd0 a2=0 a3=7fff884edbbc items=0 ppid=2897 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:54.072000 audit[2981]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.072000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb47c9650 a2=0 a3=7ffeb47c963c items=0 ppid=2897 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:36:54.075000 audit[2982]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.075000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5013a600 a2=0 a3=7ffd5013a5ec items=0 ppid=2897 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:36:54.081000 audit[2984]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.081000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc6bfae880 a2=0 a3=7ffc6bfae86c items=0 ppid=2897 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:54.091000 audit[2987]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.091000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc97cc78d0 a2=0 a3=7ffc97cc78bc items=0 ppid=2897 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:54.094000 audit[2988]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.094000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc0dfb240 a2=0 a3=7ffcc0dfb22c items=0 ppid=2897 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:36:54.100000 audit[2990]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:54.100000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdf53caf00 a2=0 a3=7ffdf53caeec items=0 ppid=2897 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:36:54.157000 audit[2996]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:54.157000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdcccded40 a2=0 a3=7ffdcccded2c items=0 ppid=2897 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:54.190000 audit[2996]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:54.190000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdcccded40 a2=0 a3=7ffdcccded2c items=0 ppid=2897 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:54.191000 audit[3001]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.191000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe19cc7650 a2=0 a3=7ffe19cc763c items=0 ppid=2897 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:36:54.194000 audit[3003]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.194000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1220a1a0 a2=0 a3=7ffd1220a18c items=0 ppid=2897 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:36:54.198000 audit[3006]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.198000 audit[3006]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff48fc4650 a2=0 a3=7fff48fc463c items=0 ppid=2897 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:36:54.200000 audit[3007]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.200000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4f1d66a0 a2=0 a3=7ffd4f1d668c items=0 ppid=2897 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:36:54.202000 audit[3009]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.202000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8342b8e0 a2=0 a3=7ffe8342b8cc items=0 ppid=2897 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:36:54.203000 audit[3010]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.203000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1bad5d50 a2=0 a3=7ffe1bad5d3c items=0 ppid=2897 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:36:54.206000 audit[3012]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.206000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe0e218a0 a2=0 a3=7fffe0e2188c items=0 ppid=2897 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:36:54.210000 audit[3015]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.210000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcc58ee250 a2=0 a3=7ffcc58ee23c items=0 ppid=2897 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:36:54.211000 audit[3016]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.211000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4e7fba60 a2=0 a3=7ffc4e7fba4c items=0 ppid=2897 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:36:54.214000 audit[3018]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.214000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb7660520 a2=0 a3=7ffdb766050c items=0 ppid=2897 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:36:54.215000 audit[3019]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.215000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe693b3500 a2=0 a3=7ffe693b34ec items=0 ppid=2897 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:36:54.218000 audit[3021]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.218000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8ef1ca70 a2=0 a3=7ffd8ef1ca5c items=0 ppid=2897 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:36:54.222000 audit[3024]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.222000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2975faa0 a2=0 a3=7ffd2975fa8c items=0 ppid=2897 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:36:54.226000 audit[3027]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.226000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeae5f8730 a2=0 a3=7ffeae5f871c items=0 ppid=2897 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:36:54.227000 audit[3028]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.227000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec6413fc0 a2=0 a3=7ffec6413fac items=0 ppid=2897 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:36:54.230000 audit[3030]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.230000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffceb2cada0 a2=0 a3=7ffceb2cad8c items=0 ppid=2897 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:54.234000 audit[3033]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.234000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3cc77e10 a2=0 a3=7ffd3cc77dfc items=0 ppid=2897 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:36:54.235000 audit[3034]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.235000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcadec3630 a2=0 a3=7ffcadec361c items=0 ppid=2897 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:36:54.237000 audit[3036]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.237000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff9a31c3b0 a2=0 a3=7fff9a31c39c items=0 ppid=2897 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:36:54.239000 audit[3037]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.239000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb9535c40 a2=0 a3=7ffcb9535c2c items=0 ppid=2897 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:36:54.241000 audit[3039]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.241000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc696d0c00 a2=0 a3=7ffc696d0bec items=0 ppid=2897 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:54.245000 audit[3042]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:54.245000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe1f14790 a2=0 a3=7fffe1f1477c items=0 ppid=2897 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:54.248000 audit[3044]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:36:54.248000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe6810b530 a2=0 a3=7ffe6810b51c items=0 ppid=2897 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.248000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:54.249000 audit[3044]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:36:54.249000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6810b530 a2=0 a3=7ffe6810b51c items=0 ppid=2897 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.249000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:54.558000 audit[2779]: USER_AUTH pid=2779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:36:55.515521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1554335751.mount: Deactivated successfully. Dec 13 14:36:55.942527 env[1563]: time="2024-12-13T14:36:55.942500569Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:55.943173 env[1563]: time="2024-12-13T14:36:55.943159521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:55.943816 env[1563]: time="2024-12-13T14:36:55.943805878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:55.944551 env[1563]: time="2024-12-13T14:36:55.944539647Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:55.944923 env[1563]: time="2024-12-13T14:36:55.944894097Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:36:55.946096 env[1563]: time="2024-12-13T14:36:55.946083272Z" level=info msg="CreateContainer within sandbox \"96d912b77af76a8dd61eb341cbc908ca59fe5ee6d8a9088034f60faabed069bc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:36:55.950065 env[1563]: time="2024-12-13T14:36:55.950050365Z" level=info msg="CreateContainer within sandbox \"96d912b77af76a8dd61eb341cbc908ca59fe5ee6d8a9088034f60faabed069bc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b1380a210a977b700e7c6e4d66aea04eb8c901fe1b05772df0d81e1f05e00c2c\"" Dec 13 14:36:55.950283 env[1563]: time="2024-12-13T14:36:55.950272222Z" level=info msg="StartContainer for \"b1380a210a977b700e7c6e4d66aea04eb8c901fe1b05772df0d81e1f05e00c2c\"" Dec 13 14:36:55.959181 systemd[1]: Started cri-containerd-b1380a210a977b700e7c6e4d66aea04eb8c901fe1b05772df0d81e1f05e00c2c.scope. Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit: BPF prog-id=111 op=LOAD Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2842 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333830613231306139373762373030653763366534643636616561 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2842 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333830613231306139373762373030653763366534643636616561 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.964000 audit: BPF prog-id=112 op=LOAD Dec 13 14:36:55.964000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9d10 items=0 ppid=2842 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333830613231306139373762373030653763366534643636616561 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit: BPF prog-id=113 op=LOAD Dec 13 14:36:55.965000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d58 items=0 ppid=2842 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333830613231306139373762373030653763366534643636616561 Dec 13 14:36:55.965000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:36:55.965000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { perfmon } for pid=3052 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit[3052]: AVC avc: denied { bpf } for pid=3052 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:55.965000 audit: BPF prog-id=114 op=LOAD Dec 13 14:36:55.965000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=2842 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333830613231306139373762373030653763366534643636616561 Dec 13 14:36:55.970726 env[1563]: time="2024-12-13T14:36:55.970704533Z" level=info msg="StartContainer for \"b1380a210a977b700e7c6e4d66aea04eb8c901fe1b05772df0d81e1f05e00c2c\" returns successfully" Dec 13 14:36:56.269054 sshd[2779]: Failed password for root from 218.92.0.231 port 14096 ssh2 Dec 13 14:36:56.626849 sshd[2779]: Received disconnect from 218.92.0.231 port 14096:11: [preauth] Dec 13 14:36:56.626849 sshd[2779]: Disconnected from authenticating user root 218.92.0.231 port 14096 [preauth] Dec 13 14:36:56.627444 sshd[2779]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:36:56.629496 systemd[1]: sshd@10-147.28.180.89:22-218.92.0.231:14096.service: Deactivated successfully. Dec 13 14:36:56.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.89:22-218.92.0.231:14096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:56.927794 kubelet[2621]: I1213 14:36:56.927716 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-lhsqf" podStartSLOduration=1.8211433129999999 podStartE2EDuration="3.92769337s" podCreationTimestamp="2024-12-13 14:36:53 +0000 UTC" firstStartedPulling="2024-12-13 14:36:53.838596352 +0000 UTC m=+13.019045815" lastFinishedPulling="2024-12-13 14:36:55.945146409 +0000 UTC m=+15.125595872" observedRunningTime="2024-12-13 14:36:56.927561965 +0000 UTC m=+16.108011432" watchObservedRunningTime="2024-12-13 14:36:56.92769337 +0000 UTC m=+16.108142833" Dec 13 14:36:58.669000 audit[3098]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:58.697077 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:36:58.697133 kernel: audit: type=1325 audit(1734100618.669:919): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:58.669000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd6ca74750 a2=0 a3=7ffd6ca7473c items=0 ppid=2897 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.853343 kernel: audit: type=1300 audit(1734100618.669:919): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd6ca74750 a2=0 a3=7ffd6ca7473c items=0 ppid=2897 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.853418 kernel: audit: type=1327 audit(1734100618.669:919): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:58.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:58.914000 audit[3098]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:58.914000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd6ca74750 a2=0 a3=0 items=0 ppid=2897 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:58.974735 kubelet[2621]: I1213 14:36:58.974715 2621 topology_manager.go:215] "Topology Admit Handler" podUID="14b774e9-4904-404f-8a84-6f09ed1be164" podNamespace="calico-system" podName="calico-typha-66b5b9b757-qj847" Dec 13 14:36:58.977608 systemd[1]: Created slice kubepods-besteffort-pod14b774e9_4904_404f_8a84_6f09ed1be164.slice. Dec 13 14:36:58.993178 kubelet[2621]: I1213 14:36:58.993161 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/14b774e9-4904-404f-8a84-6f09ed1be164-typha-certs\") pod \"calico-typha-66b5b9b757-qj847\" (UID: \"14b774e9-4904-404f-8a84-6f09ed1be164\") " pod="calico-system/calico-typha-66b5b9b757-qj847" Dec 13 14:36:58.993258 kubelet[2621]: I1213 14:36:58.993190 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gfwkz\" (UniqueName: \"kubernetes.io/projected/14b774e9-4904-404f-8a84-6f09ed1be164-kube-api-access-gfwkz\") pod \"calico-typha-66b5b9b757-qj847\" (UID: \"14b774e9-4904-404f-8a84-6f09ed1be164\") " pod="calico-system/calico-typha-66b5b9b757-qj847" Dec 13 14:36:58.993258 kubelet[2621]: I1213 14:36:58.993211 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14b774e9-4904-404f-8a84-6f09ed1be164-tigera-ca-bundle\") pod \"calico-typha-66b5b9b757-qj847\" (UID: \"14b774e9-4904-404f-8a84-6f09ed1be164\") " pod="calico-system/calico-typha-66b5b9b757-qj847" Dec 13 14:36:59.071462 kernel: audit: type=1325 audit(1734100618.914:920): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:59.071534 kernel: audit: type=1300 audit(1734100618.914:920): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd6ca74750 a2=0 a3=0 items=0 ppid=2897 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.071549 kernel: audit: type=1327 audit(1734100618.914:920): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:58.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:59.072418 kubelet[2621]: I1213 14:36:59.072399 2621 topology_manager.go:215] "Topology Admit Handler" podUID="578406d8-03f4-47fe-a0de-1f1d123d4cdf" podNamespace="calico-system" podName="calico-node-lh6gv" Dec 13 14:36:59.075172 systemd[1]: Created slice kubepods-besteffort-pod578406d8_03f4_47fe_a0de_1f1d123d4cdf.slice. Dec 13 14:36:59.093529 kubelet[2621]: I1213 14:36:59.093482 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/578406d8-03f4-47fe-a0de-1f1d123d4cdf-node-certs\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093529 kubelet[2621]: I1213 14:36:59.093525 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-cni-net-dir\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093630 kubelet[2621]: I1213 14:36:59.093539 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-lib-modules\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093630 kubelet[2621]: I1213 14:36:59.093551 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-cni-log-dir\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093630 kubelet[2621]: I1213 14:36:59.093574 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-flexvol-driver-host\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093704 kubelet[2621]: I1213 14:36:59.093639 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-var-lib-calico\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093742 kubelet[2621]: I1213 14:36:59.093710 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/578406d8-03f4-47fe-a0de-1f1d123d4cdf-tigera-ca-bundle\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093742 kubelet[2621]: I1213 14:36:59.093736 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-var-run-calico\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093783 kubelet[2621]: I1213 14:36:59.093773 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-policysync\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093833 kubelet[2621]: I1213 14:36:59.093825 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-xtables-lock\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093869 kubelet[2621]: I1213 14:36:59.093853 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/578406d8-03f4-47fe-a0de-1f1d123d4cdf-cni-bin-dir\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.093905 kubelet[2621]: I1213 14:36:59.093896 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d9wsc\" (UniqueName: \"kubernetes.io/projected/578406d8-03f4-47fe-a0de-1f1d123d4cdf-kube-api-access-d9wsc\") pod \"calico-node-lh6gv\" (UID: \"578406d8-03f4-47fe-a0de-1f1d123d4cdf\") " pod="calico-system/calico-node-lh6gv" Dec 13 14:36:59.131146 kubelet[2621]: I1213 14:36:59.131128 2621 topology_manager.go:215] "Topology Admit Handler" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" podNamespace="calico-system" podName="csi-node-driver-rjmzs" Dec 13 14:36:59.131383 kubelet[2621]: E1213 14:36:59.131375 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:36:59.136000 audit[3102]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:59.194825 kubelet[2621]: I1213 14:36:59.194810 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1e053bff-0f6b-453d-9e8c-1e2649c39957-socket-dir\") pod \"csi-node-driver-rjmzs\" (UID: \"1e053bff-0f6b-453d-9e8c-1e2649c39957\") " pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:36:59.194903 kubelet[2621]: I1213 14:36:59.194847 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1e053bff-0f6b-453d-9e8c-1e2649c39957-kubelet-dir\") pod \"csi-node-driver-rjmzs\" (UID: \"1e053bff-0f6b-453d-9e8c-1e2649c39957\") " pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:36:59.194903 kubelet[2621]: I1213 14:36:59.194864 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1e053bff-0f6b-453d-9e8c-1e2649c39957-varrun\") pod \"csi-node-driver-rjmzs\" (UID: \"1e053bff-0f6b-453d-9e8c-1e2649c39957\") " pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:36:59.194903 kubelet[2621]: I1213 14:36:59.194875 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1e053bff-0f6b-453d-9e8c-1e2649c39957-registration-dir\") pod \"csi-node-driver-rjmzs\" (UID: \"1e053bff-0f6b-453d-9e8c-1e2649c39957\") " pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:36:59.194903 kubelet[2621]: I1213 14:36:59.194889 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z9bcp\" (UniqueName: \"kubernetes.io/projected/1e053bff-0f6b-453d-9e8c-1e2649c39957-kube-api-access-z9bcp\") pod \"csi-node-driver-rjmzs\" (UID: \"1e053bff-0f6b-453d-9e8c-1e2649c39957\") " pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:36:59.195146 kubelet[2621]: E1213 14:36:59.195138 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195171 kubelet[2621]: W1213 14:36:59.195146 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195171 kubelet[2621]: E1213 14:36:59.195158 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195245 kubelet[2621]: E1213 14:36:59.195240 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195245 kubelet[2621]: W1213 14:36:59.195244 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195306 kubelet[2621]: E1213 14:36:59.195252 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195336 kubelet[2621]: E1213 14:36:59.195327 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195336 kubelet[2621]: W1213 14:36:59.195331 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195393 kubelet[2621]: E1213 14:36:59.195338 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195454 kubelet[2621]: E1213 14:36:59.195447 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195454 kubelet[2621]: W1213 14:36:59.195453 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195516 kubelet[2621]: E1213 14:36:59.195463 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195592 kubelet[2621]: E1213 14:36:59.195585 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195592 kubelet[2621]: W1213 14:36:59.195591 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195651 kubelet[2621]: E1213 14:36:59.195600 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195750 kubelet[2621]: E1213 14:36:59.195744 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195776 kubelet[2621]: W1213 14:36:59.195750 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195776 kubelet[2621]: E1213 14:36:59.195759 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195835 kubelet[2621]: E1213 14:36:59.195831 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195855 kubelet[2621]: W1213 14:36:59.195835 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195855 kubelet[2621]: E1213 14:36:59.195842 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.195950 kubelet[2621]: E1213 14:36:59.195945 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.195971 kubelet[2621]: W1213 14:36:59.195950 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.195971 kubelet[2621]: E1213 14:36:59.195956 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196031 kubelet[2621]: E1213 14:36:59.196027 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196031 kubelet[2621]: W1213 14:36:59.196031 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196065 kubelet[2621]: E1213 14:36:59.196038 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196104 kubelet[2621]: E1213 14:36:59.196100 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196125 kubelet[2621]: W1213 14:36:59.196104 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196125 kubelet[2621]: E1213 14:36:59.196110 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196189 kubelet[2621]: E1213 14:36:59.196182 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196207 kubelet[2621]: W1213 14:36:59.196189 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196207 kubelet[2621]: E1213 14:36:59.196198 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196270 kubelet[2621]: E1213 14:36:59.196265 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196292 kubelet[2621]: W1213 14:36:59.196270 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196292 kubelet[2621]: E1213 14:36:59.196277 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196368 kubelet[2621]: E1213 14:36:59.196363 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196368 kubelet[2621]: W1213 14:36:59.196368 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196404 kubelet[2621]: E1213 14:36:59.196375 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196495 kubelet[2621]: E1213 14:36:59.196490 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196495 kubelet[2621]: W1213 14:36:59.196495 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196537 kubelet[2621]: E1213 14:36:59.196502 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196592 kubelet[2621]: E1213 14:36:59.196588 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196611 kubelet[2621]: W1213 14:36:59.196592 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196611 kubelet[2621]: E1213 14:36:59.196599 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.196704 kubelet[2621]: E1213 14:36:59.196699 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.196724 kubelet[2621]: W1213 14:36:59.196705 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.196724 kubelet[2621]: E1213 14:36:59.196711 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.136000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc88b8f0d0 a2=0 a3=7ffc88b8f0bc items=0 ppid=2897 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.200589 kubelet[2621]: E1213 14:36:59.200582 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.200589 kubelet[2621]: W1213 14:36:59.200588 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.200652 kubelet[2621]: E1213 14:36:59.200596 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.278936 env[1563]: time="2024-12-13T14:36:59.278895834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66b5b9b757-qj847,Uid:14b774e9-4904-404f-8a84-6f09ed1be164,Namespace:calico-system,Attempt:0,}" Dec 13 14:36:59.285978 env[1563]: time="2024-12-13T14:36:59.285950001Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:59.285978 env[1563]: time="2024-12-13T14:36:59.285971023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:59.286059 env[1563]: time="2024-12-13T14:36:59.285977998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:59.286059 env[1563]: time="2024-12-13T14:36:59.286041480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7952bbc6bdfb8362f7583ef05dd48d4077d2ac0d986c5a3d0d83361276064f20 pid=3129 runtime=io.containerd.runc.v2 Dec 13 14:36:59.291307 systemd[1]: Started cri-containerd-7952bbc6bdfb8362f7583ef05dd48d4077d2ac0d986c5a3d0d83361276064f20.scope. Dec 13 14:36:59.295305 kernel: audit: type=1325 audit(1734100619.136:921): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:59.295337 kernel: audit: type=1300 audit(1734100619.136:921): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc88b8f0d0 a2=0 a3=7ffc88b8f0bc items=0 ppid=2897 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.295357 kernel: audit: type=1327 audit(1734100619.136:921): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:59.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:59.296690 kubelet[2621]: E1213 14:36:59.296651 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.296690 kubelet[2621]: W1213 14:36:59.296662 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.296690 kubelet[2621]: E1213 14:36:59.296674 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.296849 kubelet[2621]: E1213 14:36:59.296812 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.296849 kubelet[2621]: W1213 14:36:59.296818 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.296849 kubelet[2621]: E1213 14:36:59.296827 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.296985 kubelet[2621]: E1213 14:36:59.296949 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.296985 kubelet[2621]: W1213 14:36:59.296955 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.296985 kubelet[2621]: E1213 14:36:59.296964 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297117 kubelet[2621]: E1213 14:36:59.297077 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297117 kubelet[2621]: W1213 14:36:59.297082 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297117 kubelet[2621]: E1213 14:36:59.297090 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297171 kubelet[2621]: E1213 14:36:59.297164 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297171 kubelet[2621]: W1213 14:36:59.297168 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297207 kubelet[2621]: E1213 14:36:59.297174 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297264 kubelet[2621]: E1213 14:36:59.297257 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297283 kubelet[2621]: W1213 14:36:59.297264 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297283 kubelet[2621]: E1213 14:36:59.297276 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297354 kubelet[2621]: E1213 14:36:59.297345 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297354 kubelet[2621]: W1213 14:36:59.297352 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297397 kubelet[2621]: E1213 14:36:59.297362 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297482 kubelet[2621]: E1213 14:36:59.297478 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297501 kubelet[2621]: W1213 14:36:59.297482 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297501 kubelet[2621]: E1213 14:36:59.297490 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297589 kubelet[2621]: E1213 14:36:59.297584 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297610 kubelet[2621]: W1213 14:36:59.297590 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297610 kubelet[2621]: E1213 14:36:59.297601 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297679 kubelet[2621]: E1213 14:36:59.297674 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297698 kubelet[2621]: W1213 14:36:59.297679 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297698 kubelet[2621]: E1213 14:36:59.297688 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297759 kubelet[2621]: E1213 14:36:59.297755 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297781 kubelet[2621]: W1213 14:36:59.297759 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297781 kubelet[2621]: E1213 14:36:59.297766 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297832 kubelet[2621]: E1213 14:36:59.297828 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297832 kubelet[2621]: W1213 14:36:59.297832 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297866 kubelet[2621]: E1213 14:36:59.297838 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297917 kubelet[2621]: E1213 14:36:59.297912 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.297940 kubelet[2621]: W1213 14:36:59.297918 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.297940 kubelet[2621]: E1213 14:36:59.297928 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.297997 kubelet[2621]: E1213 14:36:59.297992 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298016 kubelet[2621]: W1213 14:36:59.297997 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298016 kubelet[2621]: E1213 14:36:59.298004 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298068 kubelet[2621]: E1213 14:36:59.298064 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298106 kubelet[2621]: W1213 14:36:59.298068 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298106 kubelet[2621]: E1213 14:36:59.298074 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298154 kubelet[2621]: E1213 14:36:59.298150 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298174 kubelet[2621]: W1213 14:36:59.298154 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298174 kubelet[2621]: E1213 14:36:59.298163 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298239 kubelet[2621]: E1213 14:36:59.298234 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298259 kubelet[2621]: W1213 14:36:59.298239 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298259 kubelet[2621]: E1213 14:36:59.298248 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298306 kubelet[2621]: E1213 14:36:59.298301 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298306 kubelet[2621]: W1213 14:36:59.298305 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298340 kubelet[2621]: E1213 14:36:59.298316 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298386 kubelet[2621]: E1213 14:36:59.298381 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298386 kubelet[2621]: W1213 14:36:59.298385 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298427 kubelet[2621]: E1213 14:36:59.298392 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298612 kubelet[2621]: E1213 14:36:59.298605 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298612 kubelet[2621]: W1213 14:36:59.298612 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298655 kubelet[2621]: E1213 14:36:59.298621 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298751 kubelet[2621]: E1213 14:36:59.298742 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298751 kubelet[2621]: W1213 14:36:59.298749 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298801 kubelet[2621]: E1213 14:36:59.298758 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298852 kubelet[2621]: E1213 14:36:59.298846 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298852 kubelet[2621]: W1213 14:36:59.298850 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298893 kubelet[2621]: E1213 14:36:59.298858 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.298931 kubelet[2621]: E1213 14:36:59.298926 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.298931 kubelet[2621]: W1213 14:36:59.298930 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.298971 kubelet[2621]: E1213 14:36:59.298937 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.299005 kubelet[2621]: E1213 14:36:59.299000 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.299005 kubelet[2621]: W1213 14:36:59.299004 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.299047 kubelet[2621]: E1213 14:36:59.299009 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.299088 kubelet[2621]: E1213 14:36:59.299083 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.299088 kubelet[2621]: W1213 14:36:59.299087 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.299133 kubelet[2621]: E1213 14:36:59.299094 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.304665 kubelet[2621]: E1213 14:36:59.304620 2621 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:36:59.304665 kubelet[2621]: W1213 14:36:59.304628 2621 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:36:59.304665 kubelet[2621]: E1213 14:36:59.304638 2621 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:36:59.354170 kernel: audit: type=1400 audit(1734100619.302:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.376685 env[1563]: time="2024-12-13T14:36:59.376662121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lh6gv,Uid:578406d8-03f4-47fe-a0de-1f1d123d4cdf,Namespace:calico-system,Attempt:0,}" Dec 13 14:36:59.382822 env[1563]: time="2024-12-13T14:36:59.382792451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:59.382822 env[1563]: time="2024-12-13T14:36:59.382811458Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:59.382822 env[1563]: time="2024-12-13T14:36:59.382818371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:59.382935 env[1563]: time="2024-12-13T14:36:59.382876905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e pid=3187 runtime=io.containerd.runc.v2 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.417000 audit: BPF prog-id=115 op=LOAD Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3129 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353262626336626466623833363266373538336566303564643438 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3129 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353262626336626466623833363266373538336566303564643438 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit: BPF prog-id=116 op=LOAD Dec 13 14:36:59.418000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0004140e0 items=0 ppid=3129 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353262626336626466623833363266373538336566303564643438 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit: BPF prog-id=117 op=LOAD Dec 13 14:36:59.418000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000414128 items=0 ppid=3129 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353262626336626466623833363266373538336566303564643438 Dec 13 14:36:59.418000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:36:59.418000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.418000 audit: BPF prog-id=118 op=LOAD Dec 13 14:36:59.418000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000414538 items=0 ppid=3129 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353262626336626466623833363266373538336566303564643438 Dec 13 14:36:59.419530 systemd[1]: Started cri-containerd-90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e.scope. Dec 13 14:36:59.421000 audit[3102]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:36:59.421000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc88b8f0d0 a2=0 a3=0 items=0 ppid=2897 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.424000 audit: BPF prog-id=119 op=LOAD Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3187 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333132343139656666643462396361373937373431313830323232 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3187 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333132343139656666643462396361373937373431313830323232 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit: BPF prog-id=120 op=LOAD Dec 13 14:36:59.425000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284fe0 items=0 ppid=3187 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333132343139656666643462396361373937373431313830323232 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit: BPF prog-id=121 op=LOAD Dec 13 14:36:59.425000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000285028 items=0 ppid=3187 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333132343139656666643462396361373937373431313830323232 Dec 13 14:36:59.425000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:36:59.425000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.425000 audit: BPF prog-id=122 op=LOAD Dec 13 14:36:59.425000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000285438 items=0 ppid=3187 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333132343139656666643462396361373937373431313830323232 Dec 13 14:36:59.430566 env[1563]: time="2024-12-13T14:36:59.430543107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lh6gv,Uid:578406d8-03f4-47fe-a0de-1f1d123d4cdf,Namespace:calico-system,Attempt:0,} returns sandbox id \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\"" Dec 13 14:36:59.431276 env[1563]: time="2024-12-13T14:36:59.431265226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:36:59.435163 env[1563]: time="2024-12-13T14:36:59.435138441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66b5b9b757-qj847,Uid:14b774e9-4904-404f-8a84-6f09ed1be164,Namespace:calico-system,Attempt:0,} returns sandbox id \"7952bbc6bdfb8362f7583ef05dd48d4077d2ac0d986c5a3d0d83361276064f20\"" Dec 13 14:37:00.446000 audit[3228]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:00.446000 audit[3228]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff698e20f0 a2=0 a3=7fff698e20dc items=0 ppid=2897 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:00.457000 audit[3228]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:00.457000 audit[3228]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff698e20f0 a2=0 a3=0 items=0 ppid=2897 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:00.878446 kubelet[2621]: E1213 14:37:00.878371 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:01.061121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1912849296.mount: Deactivated successfully. Dec 13 14:37:01.158086 env[1563]: time="2024-12-13T14:37:01.157966280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.159095 env[1563]: time="2024-12-13T14:37:01.159036974Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.160603 env[1563]: time="2024-12-13T14:37:01.160555318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.161873 env[1563]: time="2024-12-13T14:37:01.161821103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:01.162764 env[1563]: time="2024-12-13T14:37:01.162728780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:37:01.163259 env[1563]: time="2024-12-13T14:37:01.163234961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:37:01.164317 env[1563]: time="2024-12-13T14:37:01.164289055Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:37:01.171686 env[1563]: time="2024-12-13T14:37:01.171651150Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33\"" Dec 13 14:37:01.172105 env[1563]: time="2024-12-13T14:37:01.172064736Z" level=info msg="StartContainer for \"55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33\"" Dec 13 14:37:01.189341 systemd[1]: Started cri-containerd-55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33.scope. Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc73990ba18 items=0 ppid=3187 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613763333937333361326630363064613562366639336431613534 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit: BPF prog-id=123 op=LOAD Dec 13 14:37:01.199000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=3187 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613763333937333361326630363064613562366639336431613534 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit: BPF prog-id=124 op=LOAD Dec 13 14:37:01.199000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=3187 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613763333937333361326630363064613562366639336431613534 Dec 13 14:37:01.199000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:37:01.199000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { perfmon } for pid=3239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit[3239]: AVC avc: denied { bpf } for pid=3239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:01.199000 audit: BPF prog-id=125 op=LOAD Dec 13 14:37:01.199000 audit[3239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=3187 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613763333937333361326630363064613562366639336431613534 Dec 13 14:37:01.209865 env[1563]: time="2024-12-13T14:37:01.209826320Z" level=info msg="StartContainer for \"55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33\" returns successfully" Dec 13 14:37:01.221308 systemd[1]: cri-containerd-55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33.scope: Deactivated successfully. Dec 13 14:37:01.238451 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33-rootfs.mount: Deactivated successfully. Dec 13 14:37:01.243000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:37:01.479484 env[1563]: time="2024-12-13T14:37:01.479186445Z" level=info msg="shim disconnected" id=55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33 Dec 13 14:37:01.479484 env[1563]: time="2024-12-13T14:37:01.479312646Z" level=warning msg="cleaning up after shim disconnected" id=55a7c39733a2f060da5b6f93d1a545d00827ed8b292439e09105b16c212e5a33 namespace=k8s.io Dec 13 14:37:01.479484 env[1563]: time="2024-12-13T14:37:01.479345929Z" level=info msg="cleaning up dead shim" Dec 13 14:37:01.496028 env[1563]: time="2024-12-13T14:37:01.495902021Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3277 runtime=io.containerd.runc.v2\n" Dec 13 14:37:02.817336 systemd[1]: Started sshd@11-147.28.180.89:22-218.92.0.231:16656.service. Dec 13 14:37:02.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.89:22-218.92.0.231:16656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:02.875444 kubelet[2621]: E1213 14:37:02.875419 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:03.618396 env[1563]: time="2024-12-13T14:37:03.618341837Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:03.618848 env[1563]: time="2024-12-13T14:37:03.618836804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:03.619605 env[1563]: time="2024-12-13T14:37:03.619593770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:03.620590 env[1563]: time="2024-12-13T14:37:03.620555246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:03.620861 env[1563]: time="2024-12-13T14:37:03.620825710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:37:03.621243 env[1563]: time="2024-12-13T14:37:03.621202251Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:37:03.625189 env[1563]: time="2024-12-13T14:37:03.625142318Z" level=info msg="CreateContainer within sandbox \"7952bbc6bdfb8362f7583ef05dd48d4077d2ac0d986c5a3d0d83361276064f20\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:37:03.629898 env[1563]: time="2024-12-13T14:37:03.629860064Z" level=info msg="CreateContainer within sandbox \"7952bbc6bdfb8362f7583ef05dd48d4077d2ac0d986c5a3d0d83361276064f20\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"453654156e7fe2349b868d7508dcbb3fc8202a5b4f28f077e07f10978d331337\"" Dec 13 14:37:03.630216 env[1563]: time="2024-12-13T14:37:03.630145393Z" level=info msg="StartContainer for \"453654156e7fe2349b868d7508dcbb3fc8202a5b4f28f077e07f10978d331337\"" Dec 13 14:37:03.638352 systemd[1]: Started cri-containerd-453654156e7fe2349b868d7508dcbb3fc8202a5b4f28f077e07f10978d331337.scope. Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.644000 audit: BPF prog-id=126 op=LOAD Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3129 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:03.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333635343135366537666532333439623836386437353038646362 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3129 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:03.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333635343135366537666532333439623836386437353038646362 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit: BPF prog-id=127 op=LOAD Dec 13 14:37:03.645000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3a10 items=0 ppid=3129 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:03.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333635343135366537666532333439623836386437353038646362 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit: BPF prog-id=128 op=LOAD Dec 13 14:37:03.645000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3a58 items=0 ppid=3129 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:03.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333635343135366537666532333439623836386437353038646362 Dec 13 14:37:03.645000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:37:03.645000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:03.645000 audit: BPF prog-id=129 op=LOAD Dec 13 14:37:03.645000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3e68 items=0 ppid=3129 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:03.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435333635343135366537666532333439623836386437353038646362 Dec 13 14:37:03.663296 env[1563]: time="2024-12-13T14:37:03.663269841Z" level=info msg="StartContainer for \"453654156e7fe2349b868d7508dcbb3fc8202a5b4f28f077e07f10978d331337\" returns successfully" Dec 13 14:37:03.897989 sshd[3295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:37:03.896000 audit[3295]: USER_AUTH pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:03.941494 kernel: kauditd_printk_skb: 224 callbacks suppressed Dec 13 14:37:03.941581 kernel: audit: type=1100 audit(1734100623.896:987): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:03.999442 kubelet[2621]: I1213 14:37:03.999417 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-66b5b9b757-qj847" podStartSLOduration=1.8139134220000002 podStartE2EDuration="5.999392885s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:36:59.435600586 +0000 UTC m=+18.616050053" lastFinishedPulling="2024-12-13 14:37:03.621080043 +0000 UTC m=+22.801529516" observedRunningTime="2024-12-13 14:37:03.999128594 +0000 UTC m=+23.179578062" watchObservedRunningTime="2024-12-13 14:37:03.999392885 +0000 UTC m=+23.179842352" Dec 13 14:37:04.876139 kubelet[2621]: E1213 14:37:04.876042 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:05.002522 kubelet[2621]: I1213 14:37:05.002436 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:06.174478 sshd[3295]: Failed password for root from 218.92.0.231 port 16656 ssh2 Dec 13 14:37:06.875470 kubelet[2621]: E1213 14:37:06.875427 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:07.875000 audit[3295]: USER_AUTH pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:07.966694 env[1563]: time="2024-12-13T14:37:07.966665516Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:07.967359 kernel: audit: type=1100 audit(1734100627.875:988): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:07.967411 env[1563]: time="2024-12-13T14:37:07.967395206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:07.968069 env[1563]: time="2024-12-13T14:37:07.968029851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:07.969221 env[1563]: time="2024-12-13T14:37:07.969178579Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:07.969490 env[1563]: time="2024-12-13T14:37:07.969450182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:37:07.970555 env[1563]: time="2024-12-13T14:37:07.970540443Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:37:07.975910 env[1563]: time="2024-12-13T14:37:07.975893555Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605\"" Dec 13 14:37:07.976191 env[1563]: time="2024-12-13T14:37:07.976175356Z" level=info msg="StartContainer for \"115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605\"" Dec 13 14:37:07.986014 systemd[1]: Started cri-containerd-115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605.scope. Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f029e77e4d8 items=0 ppid=3187 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.156563 kernel: audit: type=1400 audit(1734100627.991:989): avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.156675 kernel: audit: type=1300 audit(1734100627.991:989): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f029e77e4d8 items=0 ppid=3187 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.156713 kernel: audit: type=1327 audit(1734100627.991:989): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356162313833666434666266353835643730633264353561353363 Dec 13 14:37:07.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356162313833666434666266353835643730633264353561353363 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.313977 kernel: audit: type=1400 audit(1734100627.991:990): avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.314071 kernel: audit: type=1400 audit(1734100627.991:990): avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.441461 kernel: audit: type=1400 audit(1734100627.991:990): avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.441527 kernel: audit: type=1400 audit(1734100627.991:990): avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.511326 env[1563]: time="2024-12-13T14:37:08.511292911Z" level=info msg="StartContainer for \"115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605\" returns successfully" Dec 13 14:37:08.569907 kernel: audit: type=1400 audit(1734100627.991:990): avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:07.991000 audit: BPF prog-id=130 op=LOAD Dec 13 14:37:07.991000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00021e6a8 items=0 ppid=3187 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:07.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356162313833666434666266353835643730633264353561353363 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.155000 audit: BPF prog-id=131 op=LOAD Dec 13 14:37:08.155000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00021e6f8 items=0 ppid=3187 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356162313833666434666266353835643730633264353561353363 Dec 13 14:37:08.312000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:37:08.312000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.312000 audit: BPF prog-id=132 op=LOAD Dec 13 14:37:08.312000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00021e788 items=0 ppid=3187 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356162313833666434666266353835643730633264353561353363 Dec 13 14:37:08.875839 kubelet[2621]: E1213 14:37:08.875776 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:09.359837 systemd[1]: cri-containerd-115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605.scope: Deactivated successfully. Dec 13 14:37:09.360418 systemd[1]: cri-containerd-115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605.scope: Consumed 1.272s CPU time. Dec 13 14:37:09.370591 sshd[3295]: Failed password for root from 218.92.0.231 port 16656 ssh2 Dec 13 14:37:09.372000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:37:09.402204 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605-rootfs.mount: Deactivated successfully. Dec 13 14:37:09.414286 kernel: kauditd_printk_skb: 35 callbacks suppressed Dec 13 14:37:09.414396 kernel: audit: type=1334 audit(1734100629.372:995): prog-id=132 op=UNLOAD Dec 13 14:37:09.423133 kubelet[2621]: I1213 14:37:09.423111 2621 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:37:09.438042 kubelet[2621]: I1213 14:37:09.438016 2621 topology_manager.go:215] "Topology Admit Handler" podUID="b4e17f27-ed84-4729-9efd-a4aa79457f4f" podNamespace="kube-system" podName="coredns-76f75df574-lxntb" Dec 13 14:37:09.439257 kubelet[2621]: I1213 14:37:09.439226 2621 topology_manager.go:215] "Topology Admit Handler" podUID="363a4183-7cc9-4d0c-94a1-8719b316781a" podNamespace="kube-system" podName="coredns-76f75df574-mfkwj" Dec 13 14:37:09.439699 kubelet[2621]: I1213 14:37:09.439678 2621 topology_manager.go:215] "Topology Admit Handler" podUID="e8a6578d-5930-485a-acdf-5bdf8c4d8e84" podNamespace="calico-apiserver" podName="calico-apiserver-67fc9f6856-cc2w2" Dec 13 14:37:09.439831 kubelet[2621]: I1213 14:37:09.439814 2621 topology_manager.go:215] "Topology Admit Handler" podUID="4419d31e-e2ad-4c96-904b-75bdadc746a6" podNamespace="calico-apiserver" podName="calico-apiserver-67fc9f6856-79bdt" Dec 13 14:37:09.439984 kubelet[2621]: I1213 14:37:09.439973 2621 topology_manager.go:215] "Topology Admit Handler" podUID="7baee955-ff19-454d-8775-da00e08f015b" podNamespace="calico-system" podName="calico-kube-controllers-7b58564776-j5x4s" Dec 13 14:37:09.441646 systemd[1]: Created slice kubepods-burstable-podb4e17f27_ed84_4729_9efd_a4aa79457f4f.slice. Dec 13 14:37:09.444043 systemd[1]: Created slice kubepods-besteffort-pode8a6578d_5930_485a_acdf_5bdf8c4d8e84.slice. Dec 13 14:37:09.446327 systemd[1]: Created slice kubepods-burstable-pod363a4183_7cc9_4d0c_94a1_8719b316781a.slice. Dec 13 14:37:09.448874 systemd[1]: Created slice kubepods-besteffort-pod7baee955_ff19_454d_8775_da00e08f015b.slice. Dec 13 14:37:09.450714 systemd[1]: Created slice kubepods-besteffort-pod4419d31e_e2ad_4c96_904b_75bdadc746a6.slice. Dec 13 14:37:09.468610 kubelet[2621]: I1213 14:37:09.468592 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/363a4183-7cc9-4d0c-94a1-8719b316781a-config-volume\") pod \"coredns-76f75df574-mfkwj\" (UID: \"363a4183-7cc9-4d0c-94a1-8719b316781a\") " pod="kube-system/coredns-76f75df574-mfkwj" Dec 13 14:37:09.468708 kubelet[2621]: I1213 14:37:09.468620 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x5wr7\" (UniqueName: \"kubernetes.io/projected/4419d31e-e2ad-4c96-904b-75bdadc746a6-kube-api-access-x5wr7\") pod \"calico-apiserver-67fc9f6856-79bdt\" (UID: \"4419d31e-e2ad-4c96-904b-75bdadc746a6\") " pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" Dec 13 14:37:09.468708 kubelet[2621]: I1213 14:37:09.468656 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cr9j4\" (UniqueName: \"kubernetes.io/projected/e8a6578d-5930-485a-acdf-5bdf8c4d8e84-kube-api-access-cr9j4\") pod \"calico-apiserver-67fc9f6856-cc2w2\" (UID: \"e8a6578d-5930-485a-acdf-5bdf8c4d8e84\") " pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" Dec 13 14:37:09.468708 kubelet[2621]: I1213 14:37:09.468676 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b4e17f27-ed84-4729-9efd-a4aa79457f4f-config-volume\") pod \"coredns-76f75df574-lxntb\" (UID: \"b4e17f27-ed84-4729-9efd-a4aa79457f4f\") " pod="kube-system/coredns-76f75df574-lxntb" Dec 13 14:37:09.468708 kubelet[2621]: I1213 14:37:09.468689 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h99c4\" (UniqueName: \"kubernetes.io/projected/b4e17f27-ed84-4729-9efd-a4aa79457f4f-kube-api-access-h99c4\") pod \"coredns-76f75df574-lxntb\" (UID: \"b4e17f27-ed84-4729-9efd-a4aa79457f4f\") " pod="kube-system/coredns-76f75df574-lxntb" Dec 13 14:37:09.468708 kubelet[2621]: I1213 14:37:09.468703 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lcwbp\" (UniqueName: \"kubernetes.io/projected/7baee955-ff19-454d-8775-da00e08f015b-kube-api-access-lcwbp\") pod \"calico-kube-controllers-7b58564776-j5x4s\" (UID: \"7baee955-ff19-454d-8775-da00e08f015b\") " pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" Dec 13 14:37:09.468812 kubelet[2621]: I1213 14:37:09.468733 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4419d31e-e2ad-4c96-904b-75bdadc746a6-calico-apiserver-certs\") pod \"calico-apiserver-67fc9f6856-79bdt\" (UID: \"4419d31e-e2ad-4c96-904b-75bdadc746a6\") " pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" Dec 13 14:37:09.468812 kubelet[2621]: I1213 14:37:09.468747 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7baee955-ff19-454d-8775-da00e08f015b-tigera-ca-bundle\") pod \"calico-kube-controllers-7b58564776-j5x4s\" (UID: \"7baee955-ff19-454d-8775-da00e08f015b\") " pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" Dec 13 14:37:09.468812 kubelet[2621]: I1213 14:37:09.468760 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltclx\" (UniqueName: \"kubernetes.io/projected/363a4183-7cc9-4d0c-94a1-8719b316781a-kube-api-access-ltclx\") pod \"coredns-76f75df574-mfkwj\" (UID: \"363a4183-7cc9-4d0c-94a1-8719b316781a\") " pod="kube-system/coredns-76f75df574-mfkwj" Dec 13 14:37:09.468812 kubelet[2621]: I1213 14:37:09.468785 2621 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e8a6578d-5930-485a-acdf-5bdf8c4d8e84-calico-apiserver-certs\") pod \"calico-apiserver-67fc9f6856-cc2w2\" (UID: \"e8a6578d-5930-485a-acdf-5bdf8c4d8e84\") " pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" Dec 13 14:37:09.748195 env[1563]: time="2024-12-13T14:37:09.745294989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lxntb,Uid:b4e17f27-ed84-4729-9efd-a4aa79457f4f,Namespace:kube-system,Attempt:0,}" Dec 13 14:37:09.750409 env[1563]: time="2024-12-13T14:37:09.750275153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-cc2w2,Uid:e8a6578d-5930-485a-acdf-5bdf8c4d8e84,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:37:09.750409 env[1563]: time="2024-12-13T14:37:09.750322229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mfkwj,Uid:363a4183-7cc9-4d0c-94a1-8719b316781a,Namespace:kube-system,Attempt:0,}" Dec 13 14:37:09.750998 env[1563]: time="2024-12-13T14:37:09.750871726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b58564776-j5x4s,Uid:7baee955-ff19-454d-8775-da00e08f015b,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:09.752872 env[1563]: time="2024-12-13T14:37:09.752765018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-79bdt,Uid:4419d31e-e2ad-4c96-904b-75bdadc746a6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:37:09.948000 audit[3295]: USER_AUTH pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:10.042390 kernel: audit: type=1100 audit(1734100629.948:996): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.231 addr=218.92.0.231 terminal=ssh res=failed' Dec 13 14:37:10.106371 env[1563]: time="2024-12-13T14:37:10.106275077Z" level=info msg="shim disconnected" id=115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605 Dec 13 14:37:10.106597 env[1563]: time="2024-12-13T14:37:10.106385754Z" level=warning msg="cleaning up after shim disconnected" id=115ab183fd4fbf585d70c2d55a53c423885b0d01ec285ec3e57c337eb31f9605 namespace=k8s.io Dec 13 14:37:10.106597 env[1563]: time="2024-12-13T14:37:10.106420232Z" level=info msg="cleaning up dead shim" Dec 13 14:37:10.119134 env[1563]: time="2024-12-13T14:37:10.119105673Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3417 runtime=io.containerd.runc.v2\n" Dec 13 14:37:10.156440 env[1563]: time="2024-12-13T14:37:10.156340756Z" level=error msg="Failed to destroy network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156623 env[1563]: time="2024-12-13T14:37:10.156598476Z" level=error msg="Failed to destroy network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156743 env[1563]: time="2024-12-13T14:37:10.156720128Z" level=error msg="encountered an error cleaning up failed sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156789 env[1563]: time="2024-12-13T14:37:10.156761525Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-cc2w2,Uid:e8a6578d-5930-485a-acdf-5bdf8c4d8e84,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156838 env[1563]: time="2024-12-13T14:37:10.156782175Z" level=error msg="encountered an error cleaning up failed sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156838 env[1563]: time="2024-12-13T14:37:10.156813096Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mfkwj,Uid:363a4183-7cc9-4d0c-94a1-8719b316781a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.156957 kubelet[2621]: E1213 14:37:10.156942 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157137 kubelet[2621]: E1213 14:37:10.156995 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mfkwj" Dec 13 14:37:10.157137 kubelet[2621]: E1213 14:37:10.157016 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mfkwj" Dec 13 14:37:10.157137 kubelet[2621]: E1213 14:37:10.156942 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157137 kubelet[2621]: E1213 14:37:10.157050 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" Dec 13 14:37:10.157239 kubelet[2621]: E1213 14:37:10.157056 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-mfkwj_kube-system(363a4183-7cc9-4d0c-94a1-8719b316781a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-mfkwj_kube-system(363a4183-7cc9-4d0c-94a1-8719b316781a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mfkwj" podUID="363a4183-7cc9-4d0c-94a1-8719b316781a" Dec 13 14:37:10.157239 kubelet[2621]: E1213 14:37:10.157070 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" Dec 13 14:37:10.157239 kubelet[2621]: E1213 14:37:10.157107 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-67fc9f6856-cc2w2_calico-apiserver(e8a6578d-5930-485a-acdf-5bdf8c4d8e84)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-67fc9f6856-cc2w2_calico-apiserver(e8a6578d-5930-485a-acdf-5bdf8c4d8e84)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" podUID="e8a6578d-5930-485a-acdf-5bdf8c4d8e84" Dec 13 14:37:10.157371 env[1563]: time="2024-12-13T14:37:10.157333269Z" level=error msg="Failed to destroy network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157431 env[1563]: time="2024-12-13T14:37:10.157400031Z" level=error msg="Failed to destroy network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157532 env[1563]: time="2024-12-13T14:37:10.157485082Z" level=error msg="encountered an error cleaning up failed sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157532 env[1563]: time="2024-12-13T14:37:10.157506086Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lxntb,Uid:b4e17f27-ed84-4729-9efd-a4aa79457f4f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157596 env[1563]: time="2024-12-13T14:37:10.157575535Z" level=error msg="encountered an error cleaning up failed sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157621 kubelet[2621]: E1213 14:37:10.157578 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157621 kubelet[2621]: E1213 14:37:10.157597 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-lxntb" Dec 13 14:37:10.157621 kubelet[2621]: E1213 14:37:10.157611 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-lxntb" Dec 13 14:37:10.157700 env[1563]: time="2024-12-13T14:37:10.157598508Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-79bdt,Uid:4419d31e-e2ad-4c96-904b-75bdadc746a6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157736 kubelet[2621]: E1213 14:37:10.157636 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-lxntb_kube-system(b4e17f27-ed84-4729-9efd-a4aa79457f4f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-lxntb_kube-system(b4e17f27-ed84-4729-9efd-a4aa79457f4f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-lxntb" podUID="b4e17f27-ed84-4729-9efd-a4aa79457f4f" Dec 13 14:37:10.157736 kubelet[2621]: E1213 14:37:10.157683 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.157736 kubelet[2621]: E1213 14:37:10.157705 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" Dec 13 14:37:10.157815 kubelet[2621]: E1213 14:37:10.157717 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" Dec 13 14:37:10.157815 kubelet[2621]: E1213 14:37:10.157741 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-67fc9f6856-79bdt_calico-apiserver(4419d31e-e2ad-4c96-904b-75bdadc746a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-67fc9f6856-79bdt_calico-apiserver(4419d31e-e2ad-4c96-904b-75bdadc746a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" podUID="4419d31e-e2ad-4c96-904b-75bdadc746a6" Dec 13 14:37:10.158499 env[1563]: time="2024-12-13T14:37:10.158443872Z" level=error msg="Failed to destroy network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.158631 env[1563]: time="2024-12-13T14:37:10.158588407Z" level=error msg="encountered an error cleaning up failed sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.158631 env[1563]: time="2024-12-13T14:37:10.158609720Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b58564776-j5x4s,Uid:7baee955-ff19-454d-8775-da00e08f015b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.158748 kubelet[2621]: E1213 14:37:10.158708 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.158748 kubelet[2621]: E1213 14:37:10.158726 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" Dec 13 14:37:10.158748 kubelet[2621]: E1213 14:37:10.158737 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" Dec 13 14:37:10.158816 kubelet[2621]: E1213 14:37:10.158758 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7b58564776-j5x4s_calico-system(7baee955-ff19-454d-8775-da00e08f015b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7b58564776-j5x4s_calico-system(7baee955-ff19-454d-8775-da00e08f015b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" podUID="7baee955-ff19-454d-8775-da00e08f015b" Dec 13 14:37:10.407396 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa-shm.mount: Deactivated successfully. Dec 13 14:37:10.407624 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01-shm.mount: Deactivated successfully. Dec 13 14:37:10.882594 systemd[1]: Created slice kubepods-besteffort-pod1e053bff_0f6b_453d_9e8c_1e2649c39957.slice. Dec 13 14:37:10.883870 env[1563]: time="2024-12-13T14:37:10.883809195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rjmzs,Uid:1e053bff-0f6b-453d-9e8c-1e2649c39957,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:10.913360 env[1563]: time="2024-12-13T14:37:10.913289628Z" level=error msg="Failed to destroy network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.913553 env[1563]: time="2024-12-13T14:37:10.913507998Z" level=error msg="encountered an error cleaning up failed sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.913553 env[1563]: time="2024-12-13T14:37:10.913538540Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rjmzs,Uid:1e053bff-0f6b-453d-9e8c-1e2649c39957,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.913721 kubelet[2621]: E1213 14:37:10.913672 2621 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:10.913721 kubelet[2621]: E1213 14:37:10.913709 2621 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:37:10.913798 kubelet[2621]: E1213 14:37:10.913725 2621 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rjmzs" Dec 13 14:37:10.913798 kubelet[2621]: E1213 14:37:10.913763 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rjmzs_calico-system(1e053bff-0f6b-453d-9e8c-1e2649c39957)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rjmzs_calico-system(1e053bff-0f6b-453d-9e8c-1e2649c39957)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:10.914902 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d-shm.mount: Deactivated successfully. Dec 13 14:37:11.048017 kubelet[2621]: I1213 14:37:11.047921 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:11.049416 env[1563]: time="2024-12-13T14:37:11.049299455Z" level=info msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" Dec 13 14:37:11.050095 kubelet[2621]: I1213 14:37:11.050044 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:11.051145 env[1563]: time="2024-12-13T14:37:11.051071495Z" level=info msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" Dec 13 14:37:11.052275 kubelet[2621]: I1213 14:37:11.052215 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:11.053592 env[1563]: time="2024-12-13T14:37:11.053495796Z" level=info msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" Dec 13 14:37:11.056895 kubelet[2621]: I1213 14:37:11.056872 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:11.057057 env[1563]: time="2024-12-13T14:37:11.057035022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:37:11.057181 env[1563]: time="2024-12-13T14:37:11.057163545Z" level=info msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" Dec 13 14:37:11.057322 kubelet[2621]: I1213 14:37:11.057313 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:11.057656 env[1563]: time="2024-12-13T14:37:11.057630565Z" level=info msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" Dec 13 14:37:11.057962 kubelet[2621]: I1213 14:37:11.057948 2621 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:11.058302 env[1563]: time="2024-12-13T14:37:11.058272727Z" level=info msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" Dec 13 14:37:11.071407 env[1563]: time="2024-12-13T14:37:11.071361176Z" level=error msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" failed" error="failed to destroy network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.071556 kubelet[2621]: E1213 14:37:11.071543 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:11.071596 kubelet[2621]: E1213 14:37:11.071592 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf"} Dec 13 14:37:11.071627 kubelet[2621]: E1213 14:37:11.071615 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"363a4183-7cc9-4d0c-94a1-8719b316781a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.071673 kubelet[2621]: E1213 14:37:11.071635 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"363a4183-7cc9-4d0c-94a1-8719b316781a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mfkwj" podUID="363a4183-7cc9-4d0c-94a1-8719b316781a" Dec 13 14:37:11.072208 env[1563]: time="2024-12-13T14:37:11.072177946Z" level=error msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" failed" error="failed to destroy network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.072296 kubelet[2621]: E1213 14:37:11.072288 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:11.072334 kubelet[2621]: E1213 14:37:11.072304 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01"} Dec 13 14:37:11.072334 kubelet[2621]: E1213 14:37:11.072324 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7baee955-ff19-454d-8775-da00e08f015b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.072400 kubelet[2621]: E1213 14:37:11.072343 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7baee955-ff19-454d-8775-da00e08f015b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" podUID="7baee955-ff19-454d-8775-da00e08f015b" Dec 13 14:37:11.073063 env[1563]: time="2024-12-13T14:37:11.073043321Z" level=error msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" failed" error="failed to destroy network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.073138 kubelet[2621]: E1213 14:37:11.073128 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:11.073197 kubelet[2621]: E1213 14:37:11.073147 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7"} Dec 13 14:37:11.073197 kubelet[2621]: E1213 14:37:11.073175 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8a6578d-5930-485a-acdf-5bdf8c4d8e84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.073264 env[1563]: time="2024-12-13T14:37:11.073137769Z" level=error msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" failed" error="failed to destroy network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.073291 kubelet[2621]: E1213 14:37:11.073205 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8a6578d-5930-485a-acdf-5bdf8c4d8e84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" podUID="e8a6578d-5930-485a-acdf-5bdf8c4d8e84" Dec 13 14:37:11.073291 kubelet[2621]: E1213 14:37:11.073208 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:11.073291 kubelet[2621]: E1213 14:37:11.073224 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d"} Dec 13 14:37:11.073291 kubelet[2621]: E1213 14:37:11.073244 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e053bff-0f6b-453d-9e8c-1e2649c39957\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.073412 kubelet[2621]: E1213 14:37:11.073259 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e053bff-0f6b-453d-9e8c-1e2649c39957\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rjmzs" podUID="1e053bff-0f6b-453d-9e8c-1e2649c39957" Dec 13 14:37:11.073662 env[1563]: time="2024-12-13T14:37:11.073645114Z" level=error msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" failed" error="failed to destroy network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.073747 kubelet[2621]: E1213 14:37:11.073740 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:11.073775 kubelet[2621]: E1213 14:37:11.073754 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa"} Dec 13 14:37:11.073775 kubelet[2621]: E1213 14:37:11.073772 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b4e17f27-ed84-4729-9efd-a4aa79457f4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.073825 env[1563]: time="2024-12-13T14:37:11.073736682Z" level=error msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" failed" error="failed to destroy network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:11.073845 kubelet[2621]: E1213 14:37:11.073789 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b4e17f27-ed84-4729-9efd-a4aa79457f4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-lxntb" podUID="b4e17f27-ed84-4729-9efd-a4aa79457f4f" Dec 13 14:37:11.073845 kubelet[2621]: E1213 14:37:11.073827 2621 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:11.073845 kubelet[2621]: E1213 14:37:11.073842 2621 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070"} Dec 13 14:37:11.073920 kubelet[2621]: E1213 14:37:11.073860 2621 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4419d31e-e2ad-4c96-904b-75bdadc746a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:11.073920 kubelet[2621]: E1213 14:37:11.073874 2621 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4419d31e-e2ad-4c96-904b-75bdadc746a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" podUID="4419d31e-e2ad-4c96-904b-75bdadc746a6" Dec 13 14:37:12.050594 sshd[3295]: Failed password for root from 218.92.0.231 port 16656 ssh2 Dec 13 14:37:13.928646 sshd[3295]: Received disconnect from 218.92.0.231 port 16656:11: [preauth] Dec 13 14:37:13.928646 sshd[3295]: Disconnected from authenticating user root 218.92.0.231 port 16656 [preauth] Dec 13 14:37:13.928813 sshd[3295]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.231 user=root Dec 13 14:37:13.929510 systemd[1]: sshd@11-147.28.180.89:22-218.92.0.231:16656.service: Deactivated successfully. Dec 13 14:37:13.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.89:22-218.92.0.231:16656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:14.020520 kernel: audit: type=1131 audit(1734100633.928:997): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.89:22-218.92.0.231:16656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:17.267731 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4107920062.mount: Deactivated successfully. Dec 13 14:37:17.292181 env[1563]: time="2024-12-13T14:37:17.292126563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:17.292927 env[1563]: time="2024-12-13T14:37:17.292901724Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:17.294453 env[1563]: time="2024-12-13T14:37:17.294418394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:17.295892 env[1563]: time="2024-12-13T14:37:17.295831383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:17.296626 env[1563]: time="2024-12-13T14:37:17.296565724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:37:17.303936 env[1563]: time="2024-12-13T14:37:17.303901260Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:37:17.310291 env[1563]: time="2024-12-13T14:37:17.310274302Z" level=info msg="CreateContainer within sandbox \"90312419effd4b9ca79774118022258151285b569e6fff475214e9373e77216e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"305f9e3368c789b56de7a4a1ee126ad3feafc4258ce0d75362a946a460a77bf7\"" Dec 13 14:37:17.310608 env[1563]: time="2024-12-13T14:37:17.310593124Z" level=info msg="StartContainer for \"305f9e3368c789b56de7a4a1ee126ad3feafc4258ce0d75362a946a460a77bf7\"" Dec 13 14:37:17.318938 systemd[1]: Started cri-containerd-305f9e3368c789b56de7a4a1ee126ad3feafc4258ce0d75362a946a460a77bf7.scope. Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff8e3060238 items=0 ppid=3187 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.487370 kernel: audit: type=1400 audit(1734100637.325:998): avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.487409 kernel: audit: type=1300 audit(1734100637.325:998): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff8e3060238 items=0 ppid=3187 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.487434 kernel: audit: type=1327 audit(1734100637.325:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356639653333363863373839623536646537613461316565313236 Dec 13 14:37:17.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356639653333363863373839623536646537613461316565313236 Dec 13 14:37:17.579828 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.705539 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.705612 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.768839 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.833499 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.850035 env[1563]: time="2024-12-13T14:37:17.849945154Z" level=info msg="StartContainer for \"305f9e3368c789b56de7a4a1ee126ad3feafc4258ce0d75362a946a460a77bf7\" returns successfully" Dec 13 14:37:17.897070 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.960426 kernel: audit: type=1400 audit(1734100637.325:999): avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.325000 audit: BPF prog-id=133 op=LOAD Dec 13 14:37:17.325000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=3187 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356639653333363863373839623536646537613461316565313236 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.486000 audit: BPF prog-id=134 op=LOAD Dec 13 14:37:17.486000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=3187 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356639653333363863373839623536646537613461316565313236 Dec 13 14:37:17.641000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:37:17.641000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:17.641000 audit: BPF prog-id=135 op=LOAD Dec 13 14:37:17.641000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=3187 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330356639653333363863373839623536646537613461316565313236 Dec 13 14:37:18.081340 kubelet[2621]: I1213 14:37:18.081321 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lh6gv" podStartSLOduration=2.215584888 podStartE2EDuration="20.08129821s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:36:59.431115851 +0000 UTC m=+18.611565318" lastFinishedPulling="2024-12-13 14:37:17.296829155 +0000 UTC m=+36.477278640" observedRunningTime="2024-12-13 14:37:18.080708804 +0000 UTC m=+37.261158271" watchObservedRunningTime="2024-12-13 14:37:18.08129821 +0000 UTC m=+37.261747676" Dec 13 14:37:18.132597 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:37:18.132634 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:37:19.487000 audit[4115]: AVC avc: denied { write } for pid=4115 comm="tee" name="fd" dev="proc" ino=18432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3acaba0e a2=241 a3=1b6 items=1 ppid=4083 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=18429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit[4121]: AVC avc: denied { write } for pid=4121 comm="tee" name="fd" dev="proc" ino=39162 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4118]: AVC avc: denied { write } for pid=4118 comm="tee" name="fd" dev="proc" ino=21129 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4121]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc01499fc a2=241 a3=1b6 items=1 ppid=4081 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:37:19.487000 audit[4118]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd47eb2a0c a2=241 a3=1b6 items=1 ppid=4080 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=42011 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=39159 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit[4123]: AVC avc: denied { write } for pid=4123 comm="tee" name="fd" dev="proc" ino=33333 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4123]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6497a0c a2=241 a3=1b6 items=1 ppid=4084 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=33330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit[4126]: AVC avc: denied { write } for pid=4126 comm="tee" name="fd" dev="proc" ino=42014 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4126]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdeefd49fd a2=241 a3=1b6 items=1 ppid=4087 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=29469 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit[4130]: AVC avc: denied { write } for pid=4130 comm="tee" name="fd" dev="proc" ino=34406 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff493dca0d a2=241 a3=1b6 items=1 ppid=4082 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=40175 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:19.487000 audit[4119]: AVC avc: denied { write } for pid=4119 comm="tee" name="fd" dev="proc" ino=29472 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:37:19.487000 audit[4119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1f58ba0c a2=241 a3=1b6 items=1 ppid=4085 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.487000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:37:19.487000 audit: PATH item=0 name="/dev/fd/63" inode=29468 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:37:19.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:37:21.876682 env[1563]: time="2024-12-13T14:37:21.876555850Z" level=info msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.945 [INFO][4283] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.946 [INFO][4283] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" iface="eth0" netns="/var/run/netns/cni-e3bbc62a-35fe-cbbb-2b38-2cfeba7f6f52" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.946 [INFO][4283] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" iface="eth0" netns="/var/run/netns/cni-e3bbc62a-35fe-cbbb-2b38-2cfeba7f6f52" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.946 [INFO][4283] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" iface="eth0" netns="/var/run/netns/cni-e3bbc62a-35fe-cbbb-2b38-2cfeba7f6f52" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.946 [INFO][4283] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.946 [INFO][4283] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.959 [INFO][4300] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.959 [INFO][4300] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.960 [INFO][4300] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.963 [WARNING][4300] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.963 [INFO][4300] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.964 [INFO][4300] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:21.967040 env[1563]: 2024-12-13 14:37:21.966 [INFO][4283] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:21.967365 env[1563]: time="2024-12-13T14:37:21.967068550Z" level=info msg="TearDown network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" successfully" Dec 13 14:37:21.967365 env[1563]: time="2024-12-13T14:37:21.967091536Z" level=info msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" returns successfully" Dec 13 14:37:21.967553 env[1563]: time="2024-12-13T14:37:21.967536914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-79bdt,Uid:4419d31e-e2ad-4c96-904b-75bdadc746a6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:37:21.968619 systemd[1]: run-netns-cni\x2de3bbc62a\x2d35fe\x2dcbbb\x2d2b38\x2d2cfeba7f6f52.mount: Deactivated successfully. Dec 13 14:37:22.046677 systemd-networkd[1310]: cali9dbe0039cc3: Link UP Dec 13 14:37:22.101994 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:22.102051 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9dbe0039cc3: link becomes ready Dec 13 14:37:22.102061 systemd-networkd[1310]: cali9dbe0039cc3: Gained carrier Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:21.983 [INFO][4314] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:21.990 [INFO][4314] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0 calico-apiserver-67fc9f6856- calico-apiserver 4419d31e-e2ad-4c96-904b-75bdadc746a6 772 0 2024-12-13 14:36:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67fc9f6856 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca calico-apiserver-67fc9f6856-79bdt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9dbe0039cc3 [] []}} ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:21.990 [INFO][4314] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.007 [INFO][4338] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" HandleID="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.013 [INFO][4338] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" HandleID="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000294280), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"calico-apiserver-67fc9f6856-79bdt", "timestamp":"2024-12-13 14:37:22.00734006 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.013 [INFO][4338] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.013 [INFO][4338] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.013 [INFO][4338] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.014 [INFO][4338] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.018 [INFO][4338] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.021 [INFO][4338] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.023 [INFO][4338] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.026 [INFO][4338] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.026 [INFO][4338] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.027 [INFO][4338] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1 Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.032 [INFO][4338] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.036 [INFO][4338] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.193/26] block=192.168.15.192/26 handle="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.036 [INFO][4338] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.193/26] handle="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.036 [INFO][4338] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:22.108360 env[1563]: 2024-12-13 14:37:22.036 [INFO][4338] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.193/26] IPv6=[] ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" HandleID="k8s-pod-network.df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.038 [INFO][4314] cni-plugin/k8s.go 386: Populated endpoint ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"4419d31e-e2ad-4c96-904b-75bdadc746a6", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"calico-apiserver-67fc9f6856-79bdt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9dbe0039cc3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.038 [INFO][4314] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.193/32] ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.038 [INFO][4314] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9dbe0039cc3 ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.102 [INFO][4314] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.102 [INFO][4314] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"4419d31e-e2ad-4c96-904b-75bdadc746a6", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1", Pod:"calico-apiserver-67fc9f6856-79bdt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9dbe0039cc3", MAC:"ba:5b:a8:99:54:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:22.108786 env[1563]: 2024-12-13 14:37:22.107 [INFO][4314] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-79bdt" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:22.113910 env[1563]: time="2024-12-13T14:37:22.113851549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:22.113910 env[1563]: time="2024-12-13T14:37:22.113872482Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:22.113910 env[1563]: time="2024-12-13T14:37:22.113879406Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:22.114026 env[1563]: time="2024-12-13T14:37:22.113941356Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1 pid=4369 runtime=io.containerd.runc.v2 Dec 13 14:37:22.120811 systemd[1]: Started cri-containerd-df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1.scope. Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit: BPF prog-id=136 op=LOAD Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4369 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333531343538393334366532616538306534333466303632313937 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4369 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333531343538393334366532616538306534333466303632313937 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit: BPF prog-id=137 op=LOAD Dec 13 14:37:22.124000 audit[4379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002ea720 items=0 ppid=4369 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333531343538393334366532616538306534333466303632313937 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit: BPF prog-id=138 op=LOAD Dec 13 14:37:22.124000 audit[4379]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002ea768 items=0 ppid=4369 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333531343538393334366532616538306534333466303632313937 Dec 13 14:37:22.124000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:37:22.124000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { perfmon } for pid=4379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit[4379]: AVC avc: denied { bpf } for pid=4379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.124000 audit: BPF prog-id=139 op=LOAD Dec 13 14:37:22.124000 audit[4379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002eab78 items=0 ppid=4369 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333531343538393334366532616538306534333466303632313937 Dec 13 14:37:22.141521 env[1563]: time="2024-12-13T14:37:22.141495822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-79bdt,Uid:4419d31e-e2ad-4c96-904b-75bdadc746a6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1\"" Dec 13 14:37:22.142203 env[1563]: time="2024-12-13T14:37:22.142191840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:37:22.875626 env[1563]: time="2024-12-13T14:37:22.875581733Z" level=info msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" Dec 13 14:37:22.875868 env[1563]: time="2024-12-13T14:37:22.875699975Z" level=info msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.946 [INFO][4471] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.947 [INFO][4471] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" iface="eth0" netns="/var/run/netns/cni-51df0173-4904-5190-426d-dddd9d83d29d" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.947 [INFO][4471] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" iface="eth0" netns="/var/run/netns/cni-51df0173-4904-5190-426d-dddd9d83d29d" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.947 [INFO][4471] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" iface="eth0" netns="/var/run/netns/cni-51df0173-4904-5190-426d-dddd9d83d29d" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.947 [INFO][4471] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.947 [INFO][4471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.979 [INFO][4497] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.979 [INFO][4497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.980 [INFO][4497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.988 [WARNING][4497] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.988 [INFO][4497] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.990 [INFO][4497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:22.992612 env[1563]: 2024-12-13 14:37:22.991 [INFO][4471] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:22.993711 env[1563]: time="2024-12-13T14:37:22.992744316Z" level=info msg="TearDown network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" successfully" Dec 13 14:37:22.993711 env[1563]: time="2024-12-13T14:37:22.992786014Z" level=info msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" returns successfully" Dec 13 14:37:22.993711 env[1563]: time="2024-12-13T14:37:22.993677936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b58564776-j5x4s,Uid:7baee955-ff19-454d-8775-da00e08f015b,Namespace:calico-system,Attempt:1,}" Dec 13 14:37:22.996764 systemd[1]: run-netns-cni\x2d51df0173\x2d4904\x2d5190\x2d426d\x2ddddd9d83d29d.mount: Deactivated successfully. Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.946 [INFO][4470] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.946 [INFO][4470] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" iface="eth0" netns="/var/run/netns/cni-f6d8ecb2-f5e8-34b5-6db8-8473bfc756d6" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.947 [INFO][4470] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" iface="eth0" netns="/var/run/netns/cni-f6d8ecb2-f5e8-34b5-6db8-8473bfc756d6" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.947 [INFO][4470] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" iface="eth0" netns="/var/run/netns/cni-f6d8ecb2-f5e8-34b5-6db8-8473bfc756d6" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.947 [INFO][4470] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.947 [INFO][4470] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.980 [INFO][4496] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.980 [INFO][4496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.990 [INFO][4496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.997 [WARNING][4496] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.998 [INFO][4496] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:22.999 [INFO][4496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:23.002719 env[1563]: 2024-12-13 14:37:23.001 [INFO][4470] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:23.003597 env[1563]: time="2024-12-13T14:37:23.002874107Z" level=info msg="TearDown network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" successfully" Dec 13 14:37:23.003597 env[1563]: time="2024-12-13T14:37:23.002911028Z" level=info msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" returns successfully" Dec 13 14:37:23.003783 env[1563]: time="2024-12-13T14:37:23.003741042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lxntb,Uid:b4e17f27-ed84-4729-9efd-a4aa79457f4f,Namespace:kube-system,Attempt:1,}" Dec 13 14:37:23.012688 systemd[1]: run-netns-cni\x2df6d8ecb2\x2df5e8\x2d34b5\x2d6db8\x2d8473bfc756d6.mount: Deactivated successfully. Dec 13 14:37:23.111683 systemd-networkd[1310]: calidc41a16028d: Link UP Dec 13 14:37:23.144361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:23.144457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidc41a16028d: link becomes ready Dec 13 14:37:23.171949 systemd-networkd[1310]: calidc41a16028d: Gained carrier Dec 13 14:37:23.172409 systemd-networkd[1310]: cali47ffc429c97: Link UP Dec 13 14:37:23.199655 systemd-networkd[1310]: cali47ffc429c97: Gained carrier Dec 13 14:37:23.200361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali47ffc429c97: link becomes ready Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.028 [INFO][4534] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.037 [INFO][4534] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0 coredns-76f75df574- kube-system b4e17f27-ed84-4729-9efd-a4aa79457f4f 780 0 2024-12-13 14:36:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca coredns-76f75df574-lxntb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidc41a16028d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.037 [INFO][4534] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.052 [INFO][4567] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" HandleID="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.058 [INFO][4567] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" HandleID="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000364090), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"coredns-76f75df574-lxntb", "timestamp":"2024-12-13 14:37:23.052745783 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.058 [INFO][4567] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.058 [INFO][4567] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.058 [INFO][4567] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.059 [INFO][4567] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.062 [INFO][4567] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.071 [INFO][4567] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.075 [INFO][4567] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.080 [INFO][4567] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.080 [INFO][4567] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.085 [INFO][4567] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658 Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.093 [INFO][4567] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.104 [INFO][4567] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.194/26] block=192.168.15.192/26 handle="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.104 [INFO][4567] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.194/26] handle="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.104 [INFO][4567] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:23.201307 env[1563]: 2024-12-13 14:37:23.104 [INFO][4567] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.194/26] IPv6=[] ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" HandleID="k8s-pod-network.cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.108 [INFO][4534] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b4e17f27-ed84-4729-9efd-a4aa79457f4f", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"coredns-76f75df574-lxntb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc41a16028d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.108 [INFO][4534] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.194/32] ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.108 [INFO][4534] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidc41a16028d ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.171 [INFO][4534] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.171 [INFO][4534] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b4e17f27-ed84-4729-9efd-a4aa79457f4f", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658", Pod:"coredns-76f75df574-lxntb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc41a16028d", MAC:"f2:36:ec:38:3e:a9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:23.201809 env[1563]: 2024-12-13 14:37:23.200 [INFO][4534] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658" Namespace="kube-system" Pod="coredns-76f75df574-lxntb" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.028 [INFO][4523] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.036 [INFO][4523] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0 calico-kube-controllers-7b58564776- calico-system 7baee955-ff19-454d-8775-da00e08f015b 781 0 2024-12-13 14:36:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7b58564776 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca calico-kube-controllers-7b58564776-j5x4s eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali47ffc429c97 [] []}} ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.036 [INFO][4523] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.052 [INFO][4566] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" HandleID="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.058 [INFO][4566] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" HandleID="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022b410), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"calico-kube-controllers-7b58564776-j5x4s", "timestamp":"2024-12-13 14:37:23.052572035 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.058 [INFO][4566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.104 [INFO][4566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.104 [INFO][4566] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.108 [INFO][4566] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.117 [INFO][4566] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.124 [INFO][4566] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.127 [INFO][4566] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.130 [INFO][4566] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.130 [INFO][4566] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.132 [INFO][4566] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43 Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.136 [INFO][4566] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.141 [INFO][4566] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.195/26] block=192.168.15.192/26 handle="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.141 [INFO][4566] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.195/26] handle="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.141 [INFO][4566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:23.206040 env[1563]: 2024-12-13 14:37:23.141 [INFO][4566] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.195/26] IPv6=[] ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" HandleID="k8s-pod-network.8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.143 [INFO][4523] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0", GenerateName:"calico-kube-controllers-7b58564776-", Namespace:"calico-system", SelfLink:"", UID:"7baee955-ff19-454d-8775-da00e08f015b", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b58564776", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"calico-kube-controllers-7b58564776-j5x4s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali47ffc429c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.143 [INFO][4523] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.195/32] ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.143 [INFO][4523] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali47ffc429c97 ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.199 [INFO][4523] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.199 [INFO][4523] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0", GenerateName:"calico-kube-controllers-7b58564776-", Namespace:"calico-system", SelfLink:"", UID:"7baee955-ff19-454d-8775-da00e08f015b", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b58564776", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43", Pod:"calico-kube-controllers-7b58564776-j5x4s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali47ffc429c97", MAC:"fe:12:f2:e9:cf:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:23.206533 env[1563]: 2024-12-13 14:37:23.205 [INFO][4523] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43" Namespace="calico-system" Pod="calico-kube-controllers-7b58564776-j5x4s" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:23.207230 env[1563]: time="2024-12-13T14:37:23.207196982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:23.207230 env[1563]: time="2024-12-13T14:37:23.207221995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:23.207302 env[1563]: time="2024-12-13T14:37:23.207231184Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:23.207326 env[1563]: time="2024-12-13T14:37:23.207300655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658 pid=4619 runtime=io.containerd.runc.v2 Dec 13 14:37:23.211249 env[1563]: time="2024-12-13T14:37:23.211208401Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:23.211249 env[1563]: time="2024-12-13T14:37:23.211231559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:23.211249 env[1563]: time="2024-12-13T14:37:23.211238571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:23.211443 env[1563]: time="2024-12-13T14:37:23.211320508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43 pid=4650 runtime=io.containerd.runc.v2 Dec 13 14:37:23.212954 systemd[1]: Started cri-containerd-cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658.scope. Dec 13 14:37:23.217014 systemd[1]: Started cri-containerd-8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43.scope. Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.244170 kernel: kauditd_printk_skb: 125 callbacks suppressed Dec 13 14:37:23.244229 kernel: audit: type=1400 audit(1734100643.218:1029): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.363106 kernel: audit: type=1400 audit(1734100643.218:1030): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.363171 kernel: audit: type=1400 audit(1734100643.218:1031): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.482448 kernel: audit: type=1400 audit(1734100643.218:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.482520 kernel: audit: type=1400 audit(1734100643.218:1033): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.543383 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:37:23.543437 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:37:23.543488 kernel: audit: backlog limit exceeded Dec 13 14:37:23.543520 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit: BPF prog-id=140 op=LOAD Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4619 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643230363835373164316536336333383331333532306335623865 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4619 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643230363835373164316536336333383331333532306335623865 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.568363 kernel: audit: type=1400 audit(1734100643.218:1034): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.302000 audit: BPF prog-id=141 op=LOAD Dec 13 14:37:23.302000 audit[4637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000291170 items=0 ppid=4619 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643230363835373164316536336333383331333532306335623865 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit: BPF prog-id=142 op=LOAD Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4650 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346433353035356664666635393138363135313336613263613934 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4650 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346433353035356664666635393138363135313336613263613934 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.421000 audit[4637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002911b8 items=0 ppid=4619 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643230363835373164316536336333383331333532306335623865 Dec 13 14:37:23.566000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:37:23.566000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.566000 audit: BPF prog-id=145 op=LOAD Dec 13 14:37:23.566000 audit[4637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002915c8 items=0 ppid=4619 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643230363835373164316536336333383331333532306335623865 Dec 13 14:37:23.421000 audit: BPF prog-id=144 op=LOAD Dec 13 14:37:23.421000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325a60 items=0 ppid=4650 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346433353035356664666635393138363135313336613263613934 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit: BPF prog-id=146 op=LOAD Dec 13 14:37:23.699000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325aa8 items=0 ppid=4650 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346433353035356664666635393138363135313336613263613934 Dec 13 14:37:23.699000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:37:23.699000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.699000 audit: BPF prog-id=147 op=LOAD Dec 13 14:37:23.699000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325eb8 items=0 ppid=4650 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866346433353035356664666635393138363135313336613263613934 Dec 13 14:37:23.717088 env[1563]: time="2024-12-13T14:37:23.717058152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lxntb,Uid:b4e17f27-ed84-4729-9efd-a4aa79457f4f,Namespace:kube-system,Attempt:1,} returns sandbox id \"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658\"" Dec 13 14:37:23.717415 env[1563]: time="2024-12-13T14:37:23.717401966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b58564776-j5x4s,Uid:7baee955-ff19-454d-8775-da00e08f015b,Namespace:calico-system,Attempt:1,} returns sandbox id \"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43\"" Dec 13 14:37:23.718260 env[1563]: time="2024-12-13T14:37:23.718248384Z" level=info msg="CreateContainer within sandbox \"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:37:23.722905 env[1563]: time="2024-12-13T14:37:23.722888774Z" level=info msg="CreateContainer within sandbox \"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b8a6c212abc80c97ac279bda17074ec1ab0e935472c3bb93c8ebce6d3af20b25\"" Dec 13 14:37:23.723096 env[1563]: time="2024-12-13T14:37:23.723084519Z" level=info msg="StartContainer for \"b8a6c212abc80c97ac279bda17074ec1ab0e935472c3bb93c8ebce6d3af20b25\"" Dec 13 14:37:23.730964 systemd[1]: Started cri-containerd-b8a6c212abc80c97ac279bda17074ec1ab0e935472c3bb93c8ebce6d3af20b25.scope. Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit: BPF prog-id=148 op=LOAD Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4619 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663323132616263383063393761633237396264613137303734 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4619 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663323132616263383063393761633237396264613137303734 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit: BPF prog-id=149 op=LOAD Dec 13 14:37:23.736000 audit[4746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019ef10 items=0 ppid=4619 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663323132616263383063393761633237396264613137303734 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit: BPF prog-id=150 op=LOAD Dec 13 14:37:23.736000 audit[4746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019ef58 items=0 ppid=4619 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663323132616263383063393761633237396264613137303734 Dec 13 14:37:23.736000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:37:23.736000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { perfmon } for pid=4746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit[4746]: AVC avc: denied { bpf } for pid=4746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:23.736000 audit: BPF prog-id=151 op=LOAD Dec 13 14:37:23.736000 audit[4746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019f368 items=0 ppid=4619 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:23.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613663323132616263383063393761633237396264613137303734 Dec 13 14:37:23.743208 env[1563]: time="2024-12-13T14:37:23.743156754Z" level=info msg="StartContainer for \"b8a6c212abc80c97ac279bda17074ec1ab0e935472c3bb93c8ebce6d3af20b25\" returns successfully" Dec 13 14:37:24.130900 kubelet[2621]: I1213 14:37:24.130837 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-lxntb" podStartSLOduration=31.130747069 podStartE2EDuration="31.130747069s" podCreationTimestamp="2024-12-13 14:36:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:37:24.129565055 +0000 UTC m=+43.310014590" watchObservedRunningTime="2024-12-13 14:37:24.130747069 +0000 UTC m=+43.311196584" Dec 13 14:37:24.144000 audit[4791]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=4791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:24.144000 audit[4791]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffea5d370a0 a2=0 a3=7ffea5d3708c items=0 ppid=2897 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:24.160000 audit[4791]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=4791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:24.160000 audit[4791]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffea5d370a0 a2=0 a3=0 items=0 ppid=2897 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:24.180000 audit[4793]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=4793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:24.180000 audit[4793]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7fff726bcf10 a2=0 a3=7fff726bcefc items=0 ppid=2897 pid=4793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:24.200000 audit[4793]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=4793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:24.200000 audit[4793]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7fff726bcf10 a2=0 a3=7fff726bcefc items=0 ppid=2897 pid=4793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:24.224633 systemd-networkd[1310]: cali9dbe0039cc3: Gained IPv6LL Dec 13 14:37:24.225207 systemd-networkd[1310]: calidc41a16028d: Gained IPv6LL Dec 13 14:37:24.288613 systemd-networkd[1310]: cali47ffc429c97: Gained IPv6LL Dec 13 14:37:24.884989 env[1563]: time="2024-12-13T14:37:24.884847847Z" level=info msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.953 [INFO][4855] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.953 [INFO][4855] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" iface="eth0" netns="/var/run/netns/cni-5b2e384a-17e5-4399-8263-739324906823" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.954 [INFO][4855] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" iface="eth0" netns="/var/run/netns/cni-5b2e384a-17e5-4399-8263-739324906823" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.954 [INFO][4855] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" iface="eth0" netns="/var/run/netns/cni-5b2e384a-17e5-4399-8263-739324906823" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.954 [INFO][4855] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.954 [INFO][4855] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.974 [INFO][4871] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.974 [INFO][4871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.974 [INFO][4871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.980 [WARNING][4871] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.980 [INFO][4871] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.982 [INFO][4871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:24.984295 env[1563]: 2024-12-13 14:37:24.983 [INFO][4855] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:24.984863 env[1563]: time="2024-12-13T14:37:24.984443037Z" level=info msg="TearDown network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" successfully" Dec 13 14:37:24.984863 env[1563]: time="2024-12-13T14:37:24.984479136Z" level=info msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" returns successfully" Dec 13 14:37:24.985084 env[1563]: time="2024-12-13T14:37:24.985057640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rjmzs,Uid:1e053bff-0f6b-453d-9e8c-1e2649c39957,Namespace:calico-system,Attempt:1,}" Dec 13 14:37:24.987200 systemd[1]: run-netns-cni\x2d5b2e384a\x2d17e5\x2d4399\x2d8263\x2d739324906823.mount: Deactivated successfully. Dec 13 14:37:25.067813 systemd-networkd[1310]: calicde0301fe5e: Link UP Dec 13 14:37:25.118874 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:25.118915 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicde0301fe5e: link becomes ready Dec 13 14:37:25.118929 systemd-networkd[1310]: calicde0301fe5e: Gained carrier Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.008 [INFO][4886] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.017 [INFO][4886] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0 csi-node-driver- calico-system 1e053bff-0f6b-453d-9e8c-1e2649c39957 804 0 2024-12-13 14:36:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca csi-node-driver-rjmzs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calicde0301fe5e [] []}} ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.017 [INFO][4886] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.040 [INFO][4909] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" HandleID="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.046 [INFO][4909] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" HandleID="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c9510), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"csi-node-driver-rjmzs", "timestamp":"2024-12-13 14:37:25.0400135 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.046 [INFO][4909] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.046 [INFO][4909] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.046 [INFO][4909] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.047 [INFO][4909] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.050 [INFO][4909] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.054 [INFO][4909] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.055 [INFO][4909] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.057 [INFO][4909] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.057 [INFO][4909] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.058 [INFO][4909] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491 Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.061 [INFO][4909] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.065 [INFO][4909] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.196/26] block=192.168.15.192/26 handle="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.065 [INFO][4909] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.196/26] handle="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.065 [INFO][4909] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:25.125067 env[1563]: 2024-12-13 14:37:25.065 [INFO][4909] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.196/26] IPv6=[] ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" HandleID="k8s-pod-network.a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.066 [INFO][4886] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e053bff-0f6b-453d-9e8c-1e2649c39957", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"csi-node-driver-rjmzs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicde0301fe5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.066 [INFO][4886] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.196/32] ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.067 [INFO][4886] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicde0301fe5e ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.118 [INFO][4886] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.119 [INFO][4886] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e053bff-0f6b-453d-9e8c-1e2649c39957", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491", Pod:"csi-node-driver-rjmzs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicde0301fe5e", MAC:"2e:b0:94:03:4e:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:25.125534 env[1563]: 2024-12-13 14:37:25.124 [INFO][4886] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491" Namespace="calico-system" Pod="csi-node-driver-rjmzs" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:25.130339 env[1563]: time="2024-12-13T14:37:25.130273844Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:25.130339 env[1563]: time="2024-12-13T14:37:25.130295222Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:25.130339 env[1563]: time="2024-12-13T14:37:25.130302675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:25.130454 env[1563]: time="2024-12-13T14:37:25.130411102Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491 pid=4940 runtime=io.containerd.runc.v2 Dec 13 14:37:25.137197 systemd[1]: Started cri-containerd-a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491.scope. Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit: BPF prog-id=152 op=LOAD Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:25.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138656130616236373634616663333630626534666137353962616434 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:25.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138656130616236373634616663333630626534666137353962616434 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.140000 audit: BPF prog-id=153 op=LOAD Dec 13 14:37:25.140000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fcb30 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:25.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138656130616236373634616663333630626534666137353962616434 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit: BPF prog-id=154 op=LOAD Dec 13 14:37:25.141000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fcb78 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138656130616236373634616663333630626534666137353962616434 Dec 13 14:37:25.141000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:37:25.141000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:25.141000 audit: BPF prog-id=155 op=LOAD Dec 13 14:37:25.141000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fcf88 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138656130616236373634616663333630626534666137353962616434 Dec 13 14:37:25.149118 env[1563]: time="2024-12-13T14:37:25.149071184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rjmzs,Uid:1e053bff-0f6b-453d-9e8c-1e2649c39957,Namespace:calico-system,Attempt:1,} returns sandbox id \"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491\"" Dec 13 14:37:25.879304 env[1563]: time="2024-12-13T14:37:25.879180021Z" level=info msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.923 [INFO][5030] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.924 [INFO][5030] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" iface="eth0" netns="/var/run/netns/cni-d8da77d4-06dc-b04f-a92b-a1fc899e208f" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.924 [INFO][5030] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" iface="eth0" netns="/var/run/netns/cni-d8da77d4-06dc-b04f-a92b-a1fc899e208f" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.924 [INFO][5030] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" iface="eth0" netns="/var/run/netns/cni-d8da77d4-06dc-b04f-a92b-a1fc899e208f" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.924 [INFO][5030] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.924 [INFO][5030] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.937 [INFO][5047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.937 [INFO][5047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.937 [INFO][5047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.941 [WARNING][5047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.941 [INFO][5047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.943 [INFO][5047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:25.944616 env[1563]: 2024-12-13 14:37:25.943 [INFO][5030] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:25.945274 env[1563]: time="2024-12-13T14:37:25.944671440Z" level=info msg="TearDown network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" successfully" Dec 13 14:37:25.945274 env[1563]: time="2024-12-13T14:37:25.944690476Z" level=info msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" returns successfully" Dec 13 14:37:25.945274 env[1563]: time="2024-12-13T14:37:25.945263784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-cc2w2,Uid:e8a6578d-5930-485a-acdf-5bdf8c4d8e84,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:37:25.986907 systemd[1]: run-netns-cni\x2dd8da77d4\x2d06dc\x2db04f\x2da92b\x2da1fc899e208f.mount: Deactivated successfully. Dec 13 14:37:26.008658 systemd-networkd[1310]: cali7f3170692dd: Link UP Dec 13 14:37:26.034359 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f3170692dd: link becomes ready Dec 13 14:37:26.034391 systemd-networkd[1310]: cali7f3170692dd: Gained carrier Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.959 [INFO][5060] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.966 [INFO][5060] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0 calico-apiserver-67fc9f6856- calico-apiserver e8a6578d-5930-485a-acdf-5bdf8c4d8e84 812 0 2024-12-13 14:36:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67fc9f6856 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca calico-apiserver-67fc9f6856-cc2w2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7f3170692dd [] []}} ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.966 [INFO][5060] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.982 [INFO][5082] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" HandleID="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.988 [INFO][5082] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" HandleID="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051740), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"calico-apiserver-67fc9f6856-cc2w2", "timestamp":"2024-12-13 14:37:25.982290368 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.988 [INFO][5082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.988 [INFO][5082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.988 [INFO][5082] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.989 [INFO][5082] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.992 [INFO][5082] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.995 [INFO][5082] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.996 [INFO][5082] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.998 [INFO][5082] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:25.999 [INFO][5082] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.000 [INFO][5082] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32 Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.002 [INFO][5082] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.006 [INFO][5082] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.197/26] block=192.168.15.192/26 handle="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.006 [INFO][5082] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.197/26] handle="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.006 [INFO][5082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:26.040580 env[1563]: 2024-12-13 14:37:26.006 [INFO][5082] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.197/26] IPv6=[] ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" HandleID="k8s-pod-network.a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.007 [INFO][5060] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8a6578d-5930-485a-acdf-5bdf8c4d8e84", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"calico-apiserver-67fc9f6856-cc2w2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f3170692dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.007 [INFO][5060] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.197/32] ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.007 [INFO][5060] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f3170692dd ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.034 [INFO][5060] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.034 [INFO][5060] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8a6578d-5930-485a-acdf-5bdf8c4d8e84", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32", Pod:"calico-apiserver-67fc9f6856-cc2w2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f3170692dd", MAC:"4e:d6:33:ff:c4:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:26.041027 env[1563]: 2024-12-13 14:37:26.039 [INFO][5060] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32" Namespace="calico-apiserver" Pod="calico-apiserver-67fc9f6856-cc2w2" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:26.154968 env[1563]: time="2024-12-13T14:37:26.154667795Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:26.154968 env[1563]: time="2024-12-13T14:37:26.154770789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:26.154968 env[1563]: time="2024-12-13T14:37:26.154810352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:26.155534 env[1563]: time="2024-12-13T14:37:26.155231585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32 pid=5115 runtime=io.containerd.runc.v2 Dec 13 14:37:26.184793 systemd[1]: Started cri-containerd-a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32.scope. Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit: BPF prog-id=156 op=LOAD Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5115 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137666562383861656130306636316533663937323932623234353732 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5115 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137666562383861656130306636316533663937323932623234353732 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit: BPF prog-id=157 op=LOAD Dec 13 14:37:26.192000 audit[5124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e01c0 items=0 ppid=5115 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137666562383861656130306636316533663937323932623234353732 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit: BPF prog-id=158 op=LOAD Dec 13 14:37:26.192000 audit[5124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e0208 items=0 ppid=5115 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137666562383861656130306636316533663937323932623234353732 Dec 13 14:37:26.192000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:37:26.192000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { perfmon } for pid=5124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit[5124]: AVC avc: denied { bpf } for pid=5124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.192000 audit: BPF prog-id=159 op=LOAD Dec 13 14:37:26.192000 audit[5124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e0618 items=0 ppid=5115 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137666562383861656130306636316533663937323932623234353732 Dec 13 14:37:26.213316 env[1563]: time="2024-12-13T14:37:26.213288465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67fc9f6856-cc2w2,Uid:e8a6578d-5930-485a-acdf-5bdf8c4d8e84,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32\"" Dec 13 14:37:26.656516 systemd-networkd[1310]: calicde0301fe5e: Gained IPv6LL Dec 13 14:37:26.783334 env[1563]: time="2024-12-13T14:37:26.783310731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:26.783995 env[1563]: time="2024-12-13T14:37:26.783947335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:26.784608 env[1563]: time="2024-12-13T14:37:26.784567935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:26.785783 env[1563]: time="2024-12-13T14:37:26.785744423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:26.785969 env[1563]: time="2024-12-13T14:37:26.785929719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:37:26.786253 env[1563]: time="2024-12-13T14:37:26.786238932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:37:26.786796 env[1563]: time="2024-12-13T14:37:26.786751072Z" level=info msg="CreateContainer within sandbox \"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:37:26.790501 env[1563]: time="2024-12-13T14:37:26.790450050Z" level=info msg="CreateContainer within sandbox \"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f471df14d07bad0719f7658c353658994d6ae33515becf89545277a57d463a01\"" Dec 13 14:37:26.790724 env[1563]: time="2024-12-13T14:37:26.790711245Z" level=info msg="StartContainer for \"f471df14d07bad0719f7658c353658994d6ae33515becf89545277a57d463a01\"" Dec 13 14:37:26.798152 systemd[1]: Started cri-containerd-f471df14d07bad0719f7658c353658994d6ae33515becf89545277a57d463a01.scope. Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit: BPF prog-id=160 op=LOAD Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4369 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373164663134643037626164303731396637363538633335333635 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4369 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373164663134643037626164303731396637363538633335333635 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit: BPF prog-id=161 op=LOAD Dec 13 14:37:26.803000 audit[5195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00027bdc0 items=0 ppid=4369 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373164663134643037626164303731396637363538633335333635 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.803000 audit: BPF prog-id=162 op=LOAD Dec 13 14:37:26.803000 audit[5195]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00027be08 items=0 ppid=4369 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373164663134643037626164303731396637363538633335333635 Dec 13 14:37:26.803000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:37:26.804000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { perfmon } for pid=5195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit[5195]: AVC avc: denied { bpf } for pid=5195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:26.804000 audit: BPF prog-id=163 op=LOAD Dec 13 14:37:26.804000 audit[5195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003d8218 items=0 ppid=4369 pid=5195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:26.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373164663134643037626164303731396637363538633335333635 Dec 13 14:37:26.821662 env[1563]: time="2024-12-13T14:37:26.821636016Z" level=info msg="StartContainer for \"f471df14d07bad0719f7658c353658994d6ae33515becf89545277a57d463a01\" returns successfully" Dec 13 14:37:26.875474 env[1563]: time="2024-12-13T14:37:26.875416336Z" level=info msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.898 [INFO][5251] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.898 [INFO][5251] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" iface="eth0" netns="/var/run/netns/cni-2040766f-fd9e-3175-5df7-5e8b47f558e8" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.899 [INFO][5251] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" iface="eth0" netns="/var/run/netns/cni-2040766f-fd9e-3175-5df7-5e8b47f558e8" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.899 [INFO][5251] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" iface="eth0" netns="/var/run/netns/cni-2040766f-fd9e-3175-5df7-5e8b47f558e8" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.899 [INFO][5251] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.899 [INFO][5251] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.909 [INFO][5265] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.909 [INFO][5265] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.909 [INFO][5265] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.912 [WARNING][5265] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.912 [INFO][5265] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.914 [INFO][5265] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:26.915367 env[1563]: 2024-12-13 14:37:26.914 [INFO][5251] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:26.915684 env[1563]: time="2024-12-13T14:37:26.915405365Z" level=info msg="TearDown network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" successfully" Dec 13 14:37:26.915684 env[1563]: time="2024-12-13T14:37:26.915423913Z" level=info msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" returns successfully" Dec 13 14:37:26.915826 env[1563]: time="2024-12-13T14:37:26.915812954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mfkwj,Uid:363a4183-7cc9-4d0c-94a1-8719b316781a,Namespace:kube-system,Attempt:1,}" Dec 13 14:37:26.975512 systemd-networkd[1310]: cali9eb037d70a0: Link UP Dec 13 14:37:26.987617 systemd[1]: run-netns-cni\x2d2040766f\x2dfd9e\x2d3175\x2d5df7\x2d5e8b47f558e8.mount: Deactivated successfully. Dec 13 14:37:27.024556 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:37:27.024596 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9eb037d70a0: link becomes ready Dec 13 14:37:27.024702 systemd-networkd[1310]: cali9eb037d70a0: Gained carrier Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.929 [INFO][5283] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.935 [INFO][5283] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0 coredns-76f75df574- kube-system 363a4183-7cc9-4d0c-94a1-8719b316781a 822 0 2024-12-13 14:36:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-3cae5c42ca coredns-76f75df574-mfkwj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9eb037d70a0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.935 [INFO][5283] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.949 [INFO][5303] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" HandleID="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.955 [INFO][5303] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" HandleID="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00071f6c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-3cae5c42ca", "pod":"coredns-76f75df574-mfkwj", "timestamp":"2024-12-13 14:37:26.94945349 +0000 UTC"}, Hostname:"ci-3510.3.6-a-3cae5c42ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.955 [INFO][5303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.955 [INFO][5303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.955 [INFO][5303] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-3cae5c42ca' Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.956 [INFO][5303] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.959 [INFO][5303] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.961 [INFO][5303] ipam/ipam.go 489: Trying affinity for 192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.963 [INFO][5303] ipam/ipam.go 155: Attempting to load block cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.965 [INFO][5303] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.15.192/26 host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.965 [INFO][5303] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.15.192/26 handle="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.966 [INFO][5303] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.969 [INFO][5303] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.15.192/26 handle="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.973 [INFO][5303] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.15.198/26] block=192.168.15.192/26 handle="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.973 [INFO][5303] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.15.198/26] handle="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" host="ci-3510.3.6-a-3cae5c42ca" Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.973 [INFO][5303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:27.031747 env[1563]: 2024-12-13 14:37:26.973 [INFO][5303] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.15.198/26] IPv6=[] ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" HandleID="k8s-pod-network.eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:26.974 [INFO][5283] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"363a4183-7cc9-4d0c-94a1-8719b316781a", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"", Pod:"coredns-76f75df574-mfkwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9eb037d70a0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:26.974 [INFO][5283] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.15.198/32] ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:26.974 [INFO][5283] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9eb037d70a0 ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:27.024 [INFO][5283] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:27.024 [INFO][5283] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"363a4183-7cc9-4d0c-94a1-8719b316781a", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a", Pod:"coredns-76f75df574-mfkwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9eb037d70a0", MAC:"c2:03:fb:6c:5c:6c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:27.032277 env[1563]: 2024-12-13 14:37:27.031 [INFO][5283] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a" Namespace="kube-system" Pod="coredns-76f75df574-mfkwj" WorkloadEndpoint="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:27.037298 env[1563]: time="2024-12-13T14:37:27.037233096Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:27.037298 env[1563]: time="2024-12-13T14:37:27.037256380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:27.037298 env[1563]: time="2024-12-13T14:37:27.037263511Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:27.037412 env[1563]: time="2024-12-13T14:37:27.037325673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a pid=5339 runtime=io.containerd.runc.v2 Dec 13 14:37:27.045968 systemd[1]: Started cri-containerd-eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a.scope. Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit: BPF prog-id=164 op=LOAD Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5339 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663234373535316365336666346537356463383838306439323263 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5339 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663234373535316365336666346537356463383838306439323263 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit: BPF prog-id=165 op=LOAD Dec 13 14:37:27.049000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003ca1c0 items=0 ppid=5339 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663234373535316365336666346537356463383838306439323263 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.049000 audit: BPF prog-id=166 op=LOAD Dec 13 14:37:27.049000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003ca208 items=0 ppid=5339 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663234373535316365336666346537356463383838306439323263 Dec 13 14:37:27.050000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:37:27.050000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.050000 audit: BPF prog-id=167 op=LOAD Dec 13 14:37:27.050000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003ca618 items=0 ppid=5339 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663234373535316365336666346537356463383838306439323263 Dec 13 14:37:27.067384 env[1563]: time="2024-12-13T14:37:27.067358918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mfkwj,Uid:363a4183-7cc9-4d0c-94a1-8719b316781a,Namespace:kube-system,Attempt:1,} returns sandbox id \"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a\"" Dec 13 14:37:27.068873 env[1563]: time="2024-12-13T14:37:27.068847434Z" level=info msg="CreateContainer within sandbox \"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:37:27.073600 env[1563]: time="2024-12-13T14:37:27.073558712Z" level=info msg="CreateContainer within sandbox \"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1a6569ee6ffbd6b6d750f5aa6cc5f31b7a235905524b672ba5ae299b05527906\"" Dec 13 14:37:27.073811 env[1563]: time="2024-12-13T14:37:27.073797680Z" level=info msg="StartContainer for \"1a6569ee6ffbd6b6d750f5aa6cc5f31b7a235905524b672ba5ae299b05527906\"" Dec 13 14:37:27.080913 systemd[1]: Started cri-containerd-1a6569ee6ffbd6b6d750f5aa6cc5f31b7a235905524b672ba5ae299b05527906.scope. Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit: BPF prog-id=168 op=LOAD Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5339 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363536396565366666626436623664373530663561613663633566 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5339 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363536396565366666626436623664373530663561613663633566 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit: BPF prog-id=169 op=LOAD Dec 13 14:37:27.086000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020ee70 items=0 ppid=5339 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363536396565366666626436623664373530663561613663633566 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit: BPF prog-id=170 op=LOAD Dec 13 14:37:27.086000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020eeb8 items=0 ppid=5339 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363536396565366666626436623664373530663561613663633566 Dec 13 14:37:27.086000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:37:27.086000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:27.086000 audit: BPF prog-id=171 op=LOAD Dec 13 14:37:27.086000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020f2c8 items=0 ppid=5339 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363536396565366666626436623664373530663561613663633566 Dec 13 14:37:27.098447 env[1563]: time="2024-12-13T14:37:27.098421609Z" level=info msg="StartContainer for \"1a6569ee6ffbd6b6d750f5aa6cc5f31b7a235905524b672ba5ae299b05527906\" returns successfully" Dec 13 14:37:27.124043 kubelet[2621]: I1213 14:37:27.124020 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-mfkwj" podStartSLOduration=34.123989039 podStartE2EDuration="34.123989039s" podCreationTimestamp="2024-12-13 14:36:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:37:27.123867383 +0000 UTC m=+46.304316855" watchObservedRunningTime="2024-12-13 14:37:27.123989039 +0000 UTC m=+46.304438504" Dec 13 14:37:27.127000 audit[5420]: NETFILTER_CFG table=filter:99 family=2 entries=12 op=nft_register_rule pid=5420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:27.127000 audit[5420]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7ffcd9ae0a60 a2=0 a3=7ffcd9ae0a4c items=0 ppid=2897 pid=5420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:27.135056 kubelet[2621]: I1213 14:37:27.135036 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67fc9f6856-79bdt" podStartSLOduration=24.490934694 podStartE2EDuration="29.135010874s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:37:22.142067298 +0000 UTC m=+41.322516761" lastFinishedPulling="2024-12-13 14:37:26.786143477 +0000 UTC m=+45.966592941" observedRunningTime="2024-12-13 14:37:27.134618969 +0000 UTC m=+46.315068435" watchObservedRunningTime="2024-12-13 14:37:27.135010874 +0000 UTC m=+46.315460337" Dec 13 14:37:27.135000 audit[5420]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=5420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:27.135000 audit[5420]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffcd9ae0a60 a2=0 a3=7ffcd9ae0a4c items=0 ppid=2897 pid=5420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:27.146000 audit[5422]: NETFILTER_CFG table=filter:101 family=2 entries=12 op=nft_register_rule pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:27.146000 audit[5422]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7ffc04c16230 a2=0 a3=7ffc04c1621c items=0 ppid=2897 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:27.161000 audit[5422]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:27.161000 audit[5422]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffc04c16230 a2=0 a3=7ffc04c1621c items=0 ppid=2897 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:27.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:27.168495 systemd-networkd[1310]: cali7f3170692dd: Gained IPv6LL Dec 13 14:37:27.655298 kubelet[2621]: I1213 14:37:27.655195 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:27.729000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:37:27.729000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b68040 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:37:27.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:37:28.179000 audit[5492]: NETFILTER_CFG table=filter:103 family=2 entries=10 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:28.179000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcce415210 a2=0 a3=7ffcce4151fc items=0 ppid=2897 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:28.191000 audit[5492]: NETFILTER_CFG table=nat:104 family=2 entries=32 op=nft_register_chain pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:28.191000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=12156 a0=3 a1=7ffcce415210 a2=0 a3=7ffcce4151fc items=0 ppid=2897 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:28.768412 systemd-networkd[1310]: cali9eb037d70a0: Gained IPv6LL Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.798520 kernel: kauditd_printk_skb: 483 callbacks suppressed Dec 13 14:37:28.798603 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.855356 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.966479 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.966545 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.078416 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.078499 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.134367 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.233053 env[1563]: time="2024-12-13T14:37:29.232967795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:29.233704 env[1563]: time="2024-12-13T14:37:29.233663269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:29.234388 env[1563]: time="2024-12-13T14:37:29.234365544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:29.235063 env[1563]: time="2024-12-13T14:37:29.235024199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:29.235219 env[1563]: time="2024-12-13T14:37:29.235181802Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:37:29.235566 env[1563]: time="2024-12-13T14:37:29.235551796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:37:29.238780 env[1563]: time="2024-12-13T14:37:29.238762585Z" level=info msg="CreateContainer within sandbox \"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:37:29.245751 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.245798 kernel: audit: type=1400 audit(1734100648.773:1184): avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.773000 audit: BPF prog-id=172 op=LOAD Dec 13 14:37:29.302769 env[1563]: time="2024-12-13T14:37:29.302747980Z" level=info msg="CreateContainer within sandbox \"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f5ce902fe5f416bba49682a555e3e189cb5a9a72f4d047b5358b2292dd9210dc\"" Dec 13 14:37:29.303088 env[1563]: time="2024-12-13T14:37:29.303039811Z" level=info msg="StartContainer for \"f5ce902fe5f416bba49682a555e3e189cb5a9a72f4d047b5358b2292dd9210dc\"" Dec 13 14:37:29.311046 systemd[1]: Started cri-containerd-f5ce902fe5f416bba49682a555e3e189cb5a9a72f4d047b5358b2292dd9210dc.scope. Dec 13 14:37:29.325902 kernel: audit: type=1334 audit(1734100648.773:1184): prog-id=172 op=LOAD Dec 13 14:37:28.773000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdab9b1130 a2=98 a3=3 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.773000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:28.853000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.853000 audit: BPF prog-id=173 op=LOAD Dec 13 14:37:28.853000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdab9b0f10 a2=74 a3=540051 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.853000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:28.965000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:28.965000 audit: BPF prog-id=174 op=LOAD Dec 13 14:37:28.965000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdab9b0f40 a2=94 a3=2 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.021000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.103000 audit: BPF prog-id=175 op=LOAD Dec 13 14:37:29.103000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdab9b0e00 a2=40 a3=1 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.188000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:37:29.188000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.188000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdab9b0ed0 a2=50 a3=7ffdab9b0fb0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.195000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.195000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0e10 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.195000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.195000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.195000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdab9b0e40 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.195000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.195000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.195000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdab9b0d50 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.195000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.195000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.195000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0e60 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.195000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0e40 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0e30 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0e60 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdab9b0e40 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdab9b0e60 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdab9b0e30 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdab9b0ea0 a2=28 a3=0 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdab9b0c50 a2=50 a3=1 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit: BPF prog-id=176 op=LOAD Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdab9b0c50 a2=94 a3=5 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdab9b0d00 a2=50 a3=1 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdab9b0e20 a2=4 a3=38 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.324000 audit[5520]: AVC avc: denied { confidentiality } for pid=5520 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.324000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdab9b0e70 a2=94 a3=6 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.324000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { confidentiality } for pid=5520 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.325000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdab9b0620 a2=94 a3=83 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.325000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.325000 audit[5520]: AVC avc: denied { confidentiality } for pid=5520 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.325000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdab9b0620 a2=94 a3=83 items=0 ppid=5495 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.325000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit: BPF prog-id=177 op=LOAD Dec 13 14:37:29.329000 audit[5549]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd9ee30c0 a2=98 a3=1999999999999999 items=0 ppid=5495 pid=5549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.329000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:37:29.329000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit: BPF prog-id=178 op=LOAD Dec 13 14:37:29.329000 audit[5549]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd9ee2fa0 a2=74 a3=ffff items=0 ppid=5495 pid=5549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.329000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:37:29.329000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { perfmon } for pid=5549 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit[5549]: AVC avc: denied { bpf } for pid=5549 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.329000 audit: BPF prog-id=179 op=LOAD Dec 13 14:37:29.329000 audit[5549]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd9ee2fe0 a2=40 a3=7fffd9ee31c0 items=0 ppid=5495 pid=5549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.329000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:37:29.329000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit: BPF prog-id=180 op=LOAD Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4650 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636539303266653566343136626261343936383261353535653365 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4650 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636539303266653566343136626261343936383261353535653365 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit: BPF prog-id=181 op=LOAD Dec 13 14:37:29.334000 audit[5530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c30 items=0 ppid=4650 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636539303266653566343136626261343936383261353535653365 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit: BPF prog-id=182 op=LOAD Dec 13 14:37:29.334000 audit[5530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3c78 items=0 ppid=4650 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636539303266653566343136626261343936383261353535653365 Dec 13 14:37:29.334000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:37:29.334000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { perfmon } for pid=5530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit[5530]: AVC avc: denied { bpf } for pid=5530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.334000 audit: BPF prog-id=183 op=LOAD Dec 13 14:37:29.334000 audit[5530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de088 items=0 ppid=4650 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636539303266653566343136626261343936383261353535653365 Dec 13 14:37:29.353551 env[1563]: time="2024-12-13T14:37:29.353519354Z" level=info msg="StartContainer for \"f5ce902fe5f416bba49682a555e3e189cb5a9a72f4d047b5358b2292dd9210dc\" returns successfully" Dec 13 14:37:29.355057 systemd-networkd[1310]: vxlan.calico: Link UP Dec 13 14:37:29.355060 systemd-networkd[1310]: vxlan.calico: Gained carrier Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit: BPF prog-id=184 op=LOAD Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd566e29b0 a2=98 a3=ffffffff items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit: BPF prog-id=185 op=LOAD Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd566e27c0 a2=74 a3=540051 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit: BPF prog-id=186 op=LOAD Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd566e27f0 a2=94 a3=2 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e26c0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd566e26f0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd566e2600 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e2710 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e26f0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e26e0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e2710 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd566e26f0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd566e2710 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd566e26e0 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd566e2750 a2=28 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.361000 audit: BPF prog-id=187 op=LOAD Dec 13 14:37:29.361000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd566e25c0 a2=40 a3=0 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.361000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.361000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd566e25b0 a2=50 a3=2800 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.362000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd566e25b0 a2=50 a3=2800 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.362000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit: BPF prog-id=188 op=LOAD Dec 13 14:37:29.362000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd566e1dd0 a2=94 a3=2 items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.362000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.362000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { perfmon } for pid=5595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit[5595]: AVC avc: denied { bpf } for pid=5595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.362000 audit: BPF prog-id=189 op=LOAD Dec 13 14:37:29.362000 audit[5595]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd566e1ed0 a2=94 a3=2d items=0 ppid=5495 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.362000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit: BPF prog-id=190 op=LOAD Dec 13 14:37:29.363000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6c5f5500 a2=98 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.363000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit: BPF prog-id=191 op=LOAD Dec 13 14:37:29.363000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6c5f52e0 a2=74 a3=540051 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.363000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.363000 audit: BPF prog-id=192 op=LOAD Dec 13 14:37:29.363000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6c5f5310 a2=94 a3=2 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.363000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.363000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit: BPF prog-id=193 op=LOAD Dec 13 14:37:29.449000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6c5f51d0 a2=40 a3=1 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.449000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:37:29.449000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.449000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6c5f52a0 a2=50 a3=7fff6c5f5380 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f51e0 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c5f5210 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c5f5120 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f5230 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f5210 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f5200 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f5230 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c5f5210 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c5f5230 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.455000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.455000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c5f5200 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c5f5270 a2=28 a3=0 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6c5f5020 a2=50 a3=1 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit: BPF prog-id=194 op=LOAD Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6c5f5020 a2=94 a3=5 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6c5f50d0 a2=50 a3=1 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6c5f51f0 a2=4 a3=38 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { confidentiality } for pid=5603 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6c5f5240 a2=94 a3=6 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { confidentiality } for pid=5603 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6c5f49f0 a2=94 a3=83 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { perfmon } for pid=5603 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { confidentiality } for pid=5603 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6c5f49f0 a2=94 a3=83 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6c5f6430 a2=10 a3=f1f00800 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6c5f62d0 a2=10 a3=3 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6c5f6270 a2=10 a3=3 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.456000 audit[5603]: AVC avc: denied { bpf } for pid=5603 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:29.456000 audit[5603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6c5f6270 a2=10 a3=7 items=0 ppid=5495 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:37:29.478000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:37:29.600000 audit[5668]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=5668 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:29.600000 audit[5668]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdc0999330 a2=0 a3=7ffdc099931c items=0 ppid=5495 pid=5668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:29.615000 audit[5670]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=5670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:29.615000 audit[5670]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffea74f50d0 a2=0 a3=7ffea74f50bc items=0 ppid=5495 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:29.619000 audit[5667]: NETFILTER_CFG table=raw:107 family=2 entries=21 op=nft_register_chain pid=5667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:29.619000 audit[5667]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd1607e380 a2=0 a3=7ffd1607e36c items=0 ppid=5495 pid=5667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:29.619000 audit[5671]: NETFILTER_CFG table=filter:108 family=2 entries=215 op=nft_register_chain pid=5671 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:37:29.619000 audit[5671]: SYSCALL arch=c000003e syscall=46 success=yes exit=125772 a0=3 a1=7ffede5b5b60 a2=0 a3=55841d035000 items=0 ppid=5495 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:29.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:37:30.152300 kubelet[2621]: I1213 14:37:30.152234 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7b58564776-j5x4s" podStartSLOduration=26.634532316 podStartE2EDuration="32.152136744s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:37:23.717830016 +0000 UTC m=+42.898279481" lastFinishedPulling="2024-12-13 14:37:29.235434442 +0000 UTC m=+48.415883909" observedRunningTime="2024-12-13 14:37:30.1514938 +0000 UTC m=+49.331943377" watchObservedRunningTime="2024-12-13 14:37:30.152136744 +0000 UTC m=+49.332586283" Dec 13 14:37:30.625915 env[1563]: time="2024-12-13T14:37:30.625858245Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.626482 env[1563]: time="2024-12-13T14:37:30.626440461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.627206 env[1563]: time="2024-12-13T14:37:30.627148541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.627915 env[1563]: time="2024-12-13T14:37:30.627869006Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.628241 env[1563]: time="2024-12-13T14:37:30.628202711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:37:30.628561 env[1563]: time="2024-12-13T14:37:30.628542969Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:37:30.629246 env[1563]: time="2024-12-13T14:37:30.629209177Z" level=info msg="CreateContainer within sandbox \"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:37:30.634890 env[1563]: time="2024-12-13T14:37:30.634872518Z" level=info msg="CreateContainer within sandbox \"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"aea4f8d158b028fc9ead9fbfc9c78e6085b75ba34aeda995534ed77f3f298358\"" Dec 13 14:37:30.635180 env[1563]: time="2024-12-13T14:37:30.635135439Z" level=info msg="StartContainer for \"aea4f8d158b028fc9ead9fbfc9c78e6085b75ba34aeda995534ed77f3f298358\"" Dec 13 14:37:30.646781 systemd[1]: Started cri-containerd-aea4f8d158b028fc9ead9fbfc9c78e6085b75ba34aeda995534ed77f3f298358.scope. Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd6b0654cf8 items=0 ppid=4940 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613466386431353862303238666339656164396662666339633738 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.651000 audit: BPF prog-id=195 op=LOAD Dec 13 14:37:30.651000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096868 items=0 ppid=4940 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613466386431353862303238666339656164396662666339633738 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit: BPF prog-id=196 op=LOAD Dec 13 14:37:30.652000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000968b8 items=0 ppid=4940 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613466386431353862303238666339656164396662666339633738 Dec 13 14:37:30.652000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:37:30.652000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:30.652000 audit: BPF prog-id=197 op=LOAD Dec 13 14:37:30.652000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000096948 items=0 ppid=4940 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613466386431353862303238666339656164396662666339633738 Dec 13 14:37:30.659387 env[1563]: time="2024-12-13T14:37:30.659359414Z" level=info msg="StartContainer for \"aea4f8d158b028fc9ead9fbfc9c78e6085b75ba34aeda995534ed77f3f298358\" returns successfully" Dec 13 14:37:30.980738 env[1563]: time="2024-12-13T14:37:30.980509235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.982471 env[1563]: time="2024-12-13T14:37:30.982404940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.986433 env[1563]: time="2024-12-13T14:37:30.986338371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.990256 env[1563]: time="2024-12-13T14:37:30.990164001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:30.992173 env[1563]: time="2024-12-13T14:37:30.992063791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:37:30.993221 env[1563]: time="2024-12-13T14:37:30.993138412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:37:30.996611 env[1563]: time="2024-12-13T14:37:30.996503206Z" level=info msg="CreateContainer within sandbox \"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:37:31.010109 env[1563]: time="2024-12-13T14:37:31.009992415Z" level=info msg="CreateContainer within sandbox \"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e2c15e571ab1fc409c2473f03e315271d1650b4a5f38eb407ef2cbbe8d1429d3\"" Dec 13 14:37:31.010984 env[1563]: time="2024-12-13T14:37:31.010885969Z" level=info msg="StartContainer for \"e2c15e571ab1fc409c2473f03e315271d1650b4a5f38eb407ef2cbbe8d1429d3\"" Dec 13 14:37:31.053459 systemd[1]: Started cri-containerd-e2c15e571ab1fc409c2473f03e315271d1650b4a5f38eb407ef2cbbe8d1429d3.scope. Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.068000 audit: BPF prog-id=198 op=LOAD Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5115 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532633135653537316162316663343039633234373366303365333135 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5115 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532633135653537316162316663343039633234373366303365333135 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit: BPF prog-id=199 op=LOAD Dec 13 14:37:31.069000 audit[5718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028c660 items=0 ppid=5115 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532633135653537316162316663343039633234373366303365333135 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit: BPF prog-id=200 op=LOAD Dec 13 14:37:31.069000 audit[5718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028c6a8 items=0 ppid=5115 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532633135653537316162316663343039633234373366303365333135 Dec 13 14:37:31.069000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:37:31.069000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { perfmon } for pid=5718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit[5718]: AVC avc: denied { bpf } for pid=5718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:31.069000 audit: BPF prog-id=201 op=LOAD Dec 13 14:37:31.069000 audit[5718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028cab8 items=0 ppid=5115 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532633135653537316162316663343039633234373366303365333135 Dec 13 14:37:31.100815 env[1563]: time="2024-12-13T14:37:31.100785466Z" level=info msg="StartContainer for \"e2c15e571ab1fc409c2473f03e315271d1650b4a5f38eb407ef2cbbe8d1429d3\" returns successfully" Dec 13 14:37:31.132437 kubelet[2621]: I1213 14:37:31.132418 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:31.140062 kubelet[2621]: I1213 14:37:31.140032 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67fc9f6856-cc2w2" podStartSLOduration=28.361284283 podStartE2EDuration="33.140006911s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:37:26.213884767 +0000 UTC m=+45.394334241" lastFinishedPulling="2024-12-13 14:37:30.992607295 +0000 UTC m=+50.173056869" observedRunningTime="2024-12-13 14:37:31.139517063 +0000 UTC m=+50.319966532" watchObservedRunningTime="2024-12-13 14:37:31.140006911 +0000 UTC m=+50.320456380" Dec 13 14:37:31.145000 audit[5763]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=5763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:31.145000 audit[5763]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe3898a6d0 a2=0 a3=7ffe3898a6bc items=0 ppid=2897 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:31.164000 audit[5763]: NETFILTER_CFG table=nat:110 family=2 entries=30 op=nft_register_rule pid=5763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:31.164000 audit[5763]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe3898a6d0 a2=0 a3=7ffe3898a6bc items=0 ppid=2897 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:31.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:31.200524 systemd-networkd[1310]: vxlan.calico: Gained IPv6LL Dec 13 14:37:31.833000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:37:31.833000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae4080 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:37:31.833000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:37:32.135564 kubelet[2621]: I1213 14:37:32.135325 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:32.388082 env[1563]: time="2024-12-13T14:37:32.387996704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:32.388679 env[1563]: time="2024-12-13T14:37:32.388666338Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:32.389255 env[1563]: time="2024-12-13T14:37:32.389242463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:32.389946 env[1563]: time="2024-12-13T14:37:32.389933080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:32.390241 env[1563]: time="2024-12-13T14:37:32.390227587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:37:32.391246 env[1563]: time="2024-12-13T14:37:32.391234527Z" level=info msg="CreateContainer within sandbox \"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:37:32.397063 env[1563]: time="2024-12-13T14:37:32.397043589Z" level=info msg="CreateContainer within sandbox \"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2f15de21d5769b65341cdd354f74e65db6b79e8949a9865e5480866505efa55d\"" Dec 13 14:37:32.397262 env[1563]: time="2024-12-13T14:37:32.397249617Z" level=info msg="StartContainer for \"2f15de21d5769b65341cdd354f74e65db6b79e8949a9865e5480866505efa55d\"" Dec 13 14:37:32.409530 systemd[1]: Started cri-containerd-2f15de21d5769b65341cdd354f74e65db6b79e8949a9865e5480866505efa55d.scope. Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fae28162248 items=0 ppid=4940 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:32.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266313564653231643537363962363533343163646433353466373465 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit: BPF prog-id=202 op=LOAD Dec 13 14:37:32.415000 audit[5771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000398c68 items=0 ppid=4940 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:32.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266313564653231643537363962363533343163646433353466373465 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit: BPF prog-id=203 op=LOAD Dec 13 14:37:32.415000 audit[5771]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000398cb8 items=0 ppid=4940 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:32.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266313564653231643537363962363533343163646433353466373465 Dec 13 14:37:32.415000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:37:32.415000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:32.415000 audit: BPF prog-id=204 op=LOAD Dec 13 14:37:32.415000 audit[5771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000398d48 items=0 ppid=4940 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:32.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266313564653231643537363962363533343163646433353466373465 Dec 13 14:37:32.423602 env[1563]: time="2024-12-13T14:37:32.423577181Z" level=info msg="StartContainer for \"2f15de21d5769b65341cdd354f74e65db6b79e8949a9865e5480866505efa55d\" returns successfully" Dec 13 14:37:32.922487 kubelet[2621]: I1213 14:37:32.922413 2621 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:37:32.922759 kubelet[2621]: I1213 14:37:32.922516 2621 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:37:33.166829 kubelet[2621]: I1213 14:37:33.166767 2621 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-rjmzs" podStartSLOduration=27.925790904 podStartE2EDuration="35.166628945s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:37:25.149600783 +0000 UTC m=+44.330050250" lastFinishedPulling="2024-12-13 14:37:32.390438825 +0000 UTC m=+51.570888291" observedRunningTime="2024-12-13 14:37:33.166306995 +0000 UTC m=+52.346756542" watchObservedRunningTime="2024-12-13 14:37:33.166628945 +0000 UTC m=+52.347078473" Dec 13 14:37:36.672000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.696920 kernel: kauditd_printk_skb: 679 callbacks suppressed Dec 13 14:37:36.696952 kernel: audit: type=1400 audit(1734100656.672:1330): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.729588 kubelet[2621]: I1213 14:37:36.729557 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:36.672000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025514a0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:36.889064 kernel: audit: type=1300 audit(1734100656.672:1330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025514a0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:36.889132 kernel: audit: type=1327 audit(1734100656.672:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:36.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:36.974498 kernel: audit: type=1400 audit(1734100656.672:1331): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.672000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.672000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eac220 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:37.166936 kernel: audit: type=1300 audit(1734100656.672:1331): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eac220 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:37.167001 kernel: audit: type=1327 audit(1734100656.672:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:36.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:36.809000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:37.340034 kernel: audit: type=1400 audit(1734100656.809:1332): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:37.340073 kernel: audit: type=1400 audit(1734100656.809:1333): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.809000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:37.429138 kernel: audit: type=1300 audit(1734100656.809:1333): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0073ed770 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.809000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0073ed770 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:37.527360 kernel: audit: type=1300 audit(1734100656.809:1332): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006687be0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.809000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006687be0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:36.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006e903c0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006e903f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c006e904b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:36.810000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:36.810000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0083a6720 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:37:36.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:37:39.466000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:39.466000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e7bfe0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:39.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:39.466000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:39.466000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001406ec0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:39.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:39.466000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:39.466000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022faba0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:39.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:39.469000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:39.469000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014070c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:37:39.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:40.876399 env[1563]: time="2024-12-13T14:37:40.876337188Z" level=info msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.895 [WARNING][5881] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8a6578d-5930-485a-acdf-5bdf8c4d8e84", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32", Pod:"calico-apiserver-67fc9f6856-cc2w2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f3170692dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.895 [INFO][5881] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.895 [INFO][5881] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" iface="eth0" netns="" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.895 [INFO][5881] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.895 [INFO][5881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.906 [INFO][5893] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.906 [INFO][5893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.906 [INFO][5893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.911 [WARNING][5893] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.911 [INFO][5893] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.912 [INFO][5893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:40.913709 env[1563]: 2024-12-13 14:37:40.912 [INFO][5881] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.913709 env[1563]: time="2024-12-13T14:37:40.913696103Z" level=info msg="TearDown network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" successfully" Dec 13 14:37:40.914193 env[1563]: time="2024-12-13T14:37:40.913719827Z" level=info msg="StopPodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" returns successfully" Dec 13 14:37:40.914193 env[1563]: time="2024-12-13T14:37:40.914105932Z" level=info msg="RemovePodSandbox for \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" Dec 13 14:37:40.914193 env[1563]: time="2024-12-13T14:37:40.914129593Z" level=info msg="Forcibly stopping sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\"" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.937 [WARNING][5922] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8a6578d-5930-485a-acdf-5bdf8c4d8e84", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a7feb88aea00f61e3f97292b2457273ca6aecfb7214fa9cfc8d6a8056b98ad32", Pod:"calico-apiserver-67fc9f6856-cc2w2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f3170692dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.937 [INFO][5922] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.937 [INFO][5922] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" iface="eth0" netns="" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.937 [INFO][5922] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.937 [INFO][5922] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.951 [INFO][5936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.951 [INFO][5936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.951 [INFO][5936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.956 [WARNING][5936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.956 [INFO][5936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" HandleID="k8s-pod-network.c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--cc2w2-eth0" Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.957 [INFO][5936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:40.958951 env[1563]: 2024-12-13 14:37:40.958 [INFO][5922] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7" Dec 13 14:37:40.959403 env[1563]: time="2024-12-13T14:37:40.958964601Z" level=info msg="TearDown network for sandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" successfully" Dec 13 14:37:40.960710 env[1563]: time="2024-12-13T14:37:40.960668116Z" level=info msg="RemovePodSandbox \"c75e546d5de7effb819f480aa94c7bedb0072b385690088d15c3be91ed815bc7\" returns successfully" Dec 13 14:37:40.961078 env[1563]: time="2024-12-13T14:37:40.961036000Z" level=info msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.984 [WARNING][5965] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b4e17f27-ed84-4729-9efd-a4aa79457f4f", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658", Pod:"coredns-76f75df574-lxntb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc41a16028d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.984 [INFO][5965] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.984 [INFO][5965] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" iface="eth0" netns="" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.984 [INFO][5965] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.984 [INFO][5965] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.997 [INFO][5979] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.997 [INFO][5979] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:40.997 [INFO][5979] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:41.003 [WARNING][5979] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:41.003 [INFO][5979] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:41.004 [INFO][5979] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.006517 env[1563]: 2024-12-13 14:37:41.005 [INFO][5965] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.007128 env[1563]: time="2024-12-13T14:37:41.006533169Z" level=info msg="TearDown network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" successfully" Dec 13 14:37:41.007128 env[1563]: time="2024-12-13T14:37:41.006558667Z" level=info msg="StopPodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" returns successfully" Dec 13 14:37:41.007128 env[1563]: time="2024-12-13T14:37:41.006939158Z" level=info msg="RemovePodSandbox for \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" Dec 13 14:37:41.007128 env[1563]: time="2024-12-13T14:37:41.006966691Z" level=info msg="Forcibly stopping sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\"" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.048 [WARNING][6009] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b4e17f27-ed84-4729-9efd-a4aa79457f4f", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"cbd2068571d1e63c38313520c5b8e4f81ad9f30e242f4d6ae847104f37074658", Pod:"coredns-76f75df574-lxntb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc41a16028d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.048 [INFO][6009] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.048 [INFO][6009] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" iface="eth0" netns="" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.048 [INFO][6009] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.048 [INFO][6009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.072 [INFO][6025] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.072 [INFO][6025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.073 [INFO][6025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.082 [WARNING][6025] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.082 [INFO][6025] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" HandleID="k8s-pod-network.17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--lxntb-eth0" Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.084 [INFO][6025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.087487 env[1563]: 2024-12-13 14:37:41.086 [INFO][6009] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa" Dec 13 14:37:41.088288 env[1563]: time="2024-12-13T14:37:41.087508953Z" level=info msg="TearDown network for sandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" successfully" Dec 13 14:37:41.090137 env[1563]: time="2024-12-13T14:37:41.090101054Z" level=info msg="RemovePodSandbox \"17773ca4d081bdaa072e484f8e94ebb9f70b3ebea2f9f5cf04c82b3861c011fa\" returns successfully" Dec 13 14:37:41.090663 env[1563]: time="2024-12-13T14:37:41.090613848Z" level=info msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.135 [WARNING][6057] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e053bff-0f6b-453d-9e8c-1e2649c39957", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491", Pod:"csi-node-driver-rjmzs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicde0301fe5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.135 [INFO][6057] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.135 [INFO][6057] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" iface="eth0" netns="" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.135 [INFO][6057] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.135 [INFO][6057] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.159 [INFO][6074] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.159 [INFO][6074] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.159 [INFO][6074] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.168 [WARNING][6074] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.168 [INFO][6074] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.171 [INFO][6074] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.173915 env[1563]: 2024-12-13 14:37:41.172 [INFO][6057] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.173915 env[1563]: time="2024-12-13T14:37:41.173865655Z" level=info msg="TearDown network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" successfully" Dec 13 14:37:41.173915 env[1563]: time="2024-12-13T14:37:41.173904887Z" level=info msg="StopPodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" returns successfully" Dec 13 14:37:41.174791 env[1563]: time="2024-12-13T14:37:41.174261518Z" level=info msg="RemovePodSandbox for \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" Dec 13 14:37:41.174791 env[1563]: time="2024-12-13T14:37:41.174302030Z" level=info msg="Forcibly stopping sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\"" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.217 [WARNING][6106] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1e053bff-0f6b-453d-9e8c-1e2649c39957", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"a8ea0ab6764afc360be4fa759bad427d685a66224f355840d1a000fd80bfc491", Pod:"csi-node-driver-rjmzs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.15.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicde0301fe5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.217 [INFO][6106] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.217 [INFO][6106] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" iface="eth0" netns="" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.217 [INFO][6106] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.217 [INFO][6106] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.242 [INFO][6122] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.242 [INFO][6122] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.242 [INFO][6122] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.250 [WARNING][6122] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.250 [INFO][6122] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" HandleID="k8s-pod-network.2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-csi--node--driver--rjmzs-eth0" Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.252 [INFO][6122] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.255318 env[1563]: 2024-12-13 14:37:41.253 [INFO][6106] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d" Dec 13 14:37:41.256411 env[1563]: time="2024-12-13T14:37:41.255361889Z" level=info msg="TearDown network for sandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" successfully" Dec 13 14:37:41.259411 env[1563]: time="2024-12-13T14:37:41.259362014Z" level=info msg="RemovePodSandbox \"2a8e74590512818ce856917e7f1f4437b32334533108ab0e34f9a571b1309f3d\" returns successfully" Dec 13 14:37:41.259897 env[1563]: time="2024-12-13T14:37:41.259861076Z" level=info msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.303 [WARNING][6151] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"363a4183-7cc9-4d0c-94a1-8719b316781a", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a", Pod:"coredns-76f75df574-mfkwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9eb037d70a0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.303 [INFO][6151] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.303 [INFO][6151] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" iface="eth0" netns="" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.303 [INFO][6151] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.303 [INFO][6151] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.329 [INFO][6166] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.329 [INFO][6166] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.329 [INFO][6166] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.336 [WARNING][6166] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.336 [INFO][6166] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.338 [INFO][6166] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.341588 env[1563]: 2024-12-13 14:37:41.340 [INFO][6151] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.342504 env[1563]: time="2024-12-13T14:37:41.341629550Z" level=info msg="TearDown network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" successfully" Dec 13 14:37:41.342504 env[1563]: time="2024-12-13T14:37:41.341673075Z" level=info msg="StopPodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" returns successfully" Dec 13 14:37:41.342504 env[1563]: time="2024-12-13T14:37:41.342199520Z" level=info msg="RemovePodSandbox for \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" Dec 13 14:37:41.342504 env[1563]: time="2024-12-13T14:37:41.342238721Z" level=info msg="Forcibly stopping sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\"" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.390 [WARNING][6196] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"363a4183-7cc9-4d0c-94a1-8719b316781a", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"eff247551ce3ff4e75dc8880d922c8d813d995ece8552fbfe6d199a9aacc4d1a", Pod:"coredns-76f75df574-mfkwj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.15.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9eb037d70a0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.390 [INFO][6196] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.390 [INFO][6196] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" iface="eth0" netns="" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.390 [INFO][6196] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.390 [INFO][6196] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.414 [INFO][6212] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.414 [INFO][6212] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.414 [INFO][6212] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.422 [WARNING][6212] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.422 [INFO][6212] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" HandleID="k8s-pod-network.c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-coredns--76f75df574--mfkwj-eth0" Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.424 [INFO][6212] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.426806 env[1563]: 2024-12-13 14:37:41.425 [INFO][6196] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf" Dec 13 14:37:41.426806 env[1563]: time="2024-12-13T14:37:41.426778994Z" level=info msg="TearDown network for sandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" successfully" Dec 13 14:37:41.430218 env[1563]: time="2024-12-13T14:37:41.430180538Z" level=info msg="RemovePodSandbox \"c20147ed0ccc38e4b034e07d07602698dfd01969d5716ba86d531cdc415a35bf\" returns successfully" Dec 13 14:37:41.430726 env[1563]: time="2024-12-13T14:37:41.430666494Z" level=info msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.470 [WARNING][6242] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0", GenerateName:"calico-kube-controllers-7b58564776-", Namespace:"calico-system", SelfLink:"", UID:"7baee955-ff19-454d-8775-da00e08f015b", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b58564776", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43", Pod:"calico-kube-controllers-7b58564776-j5x4s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali47ffc429c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.471 [INFO][6242] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.471 [INFO][6242] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" iface="eth0" netns="" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.471 [INFO][6242] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.471 [INFO][6242] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.493 [INFO][6259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.493 [INFO][6259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.493 [INFO][6259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.502 [WARNING][6259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.502 [INFO][6259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.503 [INFO][6259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.506304 env[1563]: 2024-12-13 14:37:41.504 [INFO][6242] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.507062 env[1563]: time="2024-12-13T14:37:41.506333623Z" level=info msg="TearDown network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" successfully" Dec 13 14:37:41.507062 env[1563]: time="2024-12-13T14:37:41.506381039Z" level=info msg="StopPodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" returns successfully" Dec 13 14:37:41.507062 env[1563]: time="2024-12-13T14:37:41.506867503Z" level=info msg="RemovePodSandbox for \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" Dec 13 14:37:41.507062 env[1563]: time="2024-12-13T14:37:41.506904865Z" level=info msg="Forcibly stopping sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\"" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.548 [WARNING][6289] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0", GenerateName:"calico-kube-controllers-7b58564776-", Namespace:"calico-system", SelfLink:"", UID:"7baee955-ff19-454d-8775-da00e08f015b", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b58564776", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"8f4d35055fdff5918615136a2ca94c8757c164e1fee9e32ecba9c382d0c3ac43", Pod:"calico-kube-controllers-7b58564776-j5x4s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.15.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali47ffc429c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.548 [INFO][6289] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.548 [INFO][6289] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" iface="eth0" netns="" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.548 [INFO][6289] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.548 [INFO][6289] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.571 [INFO][6306] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.571 [INFO][6306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.571 [INFO][6306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.576 [WARNING][6306] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.576 [INFO][6306] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" HandleID="k8s-pod-network.8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--kube--controllers--7b58564776--j5x4s-eth0" Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.578 [INFO][6306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.580206 env[1563]: 2024-12-13 14:37:41.579 [INFO][6289] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01" Dec 13 14:37:41.580740 env[1563]: time="2024-12-13T14:37:41.580228487Z" level=info msg="TearDown network for sandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" successfully" Dec 13 14:37:41.582279 env[1563]: time="2024-12-13T14:37:41.582256924Z" level=info msg="RemovePodSandbox \"8a00be65565d0e9806a0202424e7a79348dba31848402ad6b5287fd85ce7ed01\" returns successfully" Dec 13 14:37:41.582607 env[1563]: time="2024-12-13T14:37:41.582582449Z" level=info msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.611 [WARNING][6337] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"4419d31e-e2ad-4c96-904b-75bdadc746a6", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1", Pod:"calico-apiserver-67fc9f6856-79bdt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9dbe0039cc3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.611 [INFO][6337] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.611 [INFO][6337] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" iface="eth0" netns="" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.611 [INFO][6337] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.611 [INFO][6337] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.627 [INFO][6351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.627 [INFO][6351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.627 [INFO][6351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.633 [WARNING][6351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.633 [INFO][6351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.635 [INFO][6351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.637289 env[1563]: 2024-12-13 14:37:41.636 [INFO][6337] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.637817 env[1563]: time="2024-12-13T14:37:41.637314690Z" level=info msg="TearDown network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" successfully" Dec 13 14:37:41.637817 env[1563]: time="2024-12-13T14:37:41.637342352Z" level=info msg="StopPodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" returns successfully" Dec 13 14:37:41.637817 env[1563]: time="2024-12-13T14:37:41.637682623Z" level=info msg="RemovePodSandbox for \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" Dec 13 14:37:41.637817 env[1563]: time="2024-12-13T14:37:41.637708413Z" level=info msg="Forcibly stopping sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\"" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.667 [WARNING][6383] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0", GenerateName:"calico-apiserver-67fc9f6856-", Namespace:"calico-apiserver", SelfLink:"", UID:"4419d31e-e2ad-4c96-904b-75bdadc746a6", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67fc9f6856", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-3cae5c42ca", ContainerID:"df3514589346e2ae80e434f062197492c03556343af08907d0c6c14634f6dab1", Pod:"calico-apiserver-67fc9f6856-79bdt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.15.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9dbe0039cc3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.667 [INFO][6383] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.667 [INFO][6383] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" iface="eth0" netns="" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.667 [INFO][6383] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.667 [INFO][6383] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.683 [INFO][6399] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.683 [INFO][6399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.683 [INFO][6399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.689 [WARNING][6399] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.689 [INFO][6399] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" HandleID="k8s-pod-network.88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Workload="ci--3510.3.6--a--3cae5c42ca-k8s-calico--apiserver--67fc9f6856--79bdt-eth0" Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.693 [INFO][6399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:37:41.698030 env[1563]: 2024-12-13 14:37:41.695 [INFO][6383] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070" Dec 13 14:37:41.699466 env[1563]: time="2024-12-13T14:37:41.698003313Z" level=info msg="TearDown network for sandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" successfully" Dec 13 14:37:41.704531 env[1563]: time="2024-12-13T14:37:41.704452034Z" level=info msg="RemovePodSandbox \"88010427d6394133560dc254ef5d62c93a47a23c05d32767427efab26cff9070\" returns successfully" Dec 13 14:37:45.940090 kubelet[2621]: I1213 14:37:45.939969 2621 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:45.969000 audit[6436]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=6436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:45.997377 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:37:45.997430 kernel: audit: type=1325 audit(1734100665.969:1342): table=filter:111 family=2 entries=8 op=nft_register_rule pid=6436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:45.969000 audit[6436]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed6c31560 a2=0 a3=7ffed6c3154c items=0 ppid=2897 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:46.155616 kernel: audit: type=1300 audit(1734100665.969:1342): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed6c31560 a2=0 a3=7ffed6c3154c items=0 ppid=2897 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:46.155648 kernel: audit: type=1327 audit(1734100665.969:1342): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:45.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:46.213000 audit[6436]: NETFILTER_CFG table=nat:112 family=2 entries=34 op=nft_register_chain pid=6436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:46.213000 audit[6436]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffed6c31560 a2=0 a3=7ffed6c3154c items=0 ppid=2897 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:46.372039 kernel: audit: type=1325 audit(1734100666.213:1343): table=nat:112 family=2 entries=34 op=nft_register_chain pid=6436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:46.372076 kernel: audit: type=1300 audit(1734100666.213:1343): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffed6c31560 a2=0 a3=7ffed6c3154c items=0 ppid=2897 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:46.372094 kernel: audit: type=1327 audit(1734100666.213:1343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:46.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:27.730000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:38:27.730000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020b6280 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:38:27.951806 kernel: audit: type=1400 audit(1734100707.730:1344): avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:38:27.951850 kernel: audit: type=1300 audit(1734100707.730:1344): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020b6280 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:38:27.951871 kernel: audit: type=1327 audit(1734100707.730:1344): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:27.730000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:31.835000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:38:31.835000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae46a0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:38:31.933357 kernel: audit: type=1400 audit(1734100711.835:1345): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:38:31.933432 kernel: audit: type=1300 audit(1734100711.835:1345): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae46a0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:38:31.835000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:32.152725 kernel: audit: type=1327 audit(1734100711.835:1345): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:36.673000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.673000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.860097 kernel: audit: type=1400 audit(1734100716.673:1346): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.860186 kernel: audit: type=1400 audit(1734100716.673:1347): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.860209 kernel: audit: type=1300 audit(1734100716.673:1346): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00293f110 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:36.673000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00293f110 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:36.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:37.076526 kernel: audit: type=1327 audit(1734100716.673:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:37.076585 kernel: audit: type=1300 audit(1734100716.673:1347): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eadea0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:36.673000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eadea0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:37.198318 kernel: audit: type=1327 audit(1734100716.673:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:36.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:37.292541 kernel: audit: type=1400 audit(1734100716.811:1348): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c000eec330 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:37.483600 kernel: audit: type=1300 audit(1734100716.811:1348): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c000eec330 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:37.483643 kernel: audit: type=1327 audit(1734100716.811:1348): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:37.577512 kernel: audit: type=1400 audit(1734100716.811:1349): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009026380 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c000eec840 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c005f34870 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00db704e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:36.811000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:36.811000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c01001c000 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:38:36.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:38:39.467000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:39.467000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b2e2e0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:39.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:39.467000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:39.467000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eadf80 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:39.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:39.468000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:39.468000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003024400 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:39.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:39.472000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:39.472000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000b18a0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:38:39.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:27.732000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:39:27.759861 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:39:27.759921 kernel: audit: type=1400 audit(1734100767.732:1358): avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:39:27.732000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002a60760 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:39:27.977239 kernel: audit: type=1300 audit(1734100767.732:1358): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002a60760 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:39:27.977274 kernel: audit: type=1327 audit(1734100767.732:1358): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:27.732000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:31.836000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:39:31.836000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae4000 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:39:32.053967 kernel: audit: type=1400 audit(1734100771.836:1359): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:39:32.054051 kernel: audit: type=1300 audit(1734100771.836:1359): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae4000 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:39:32.054073 kernel: audit: type=1327 audit(1734100771.836:1359): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:31.836000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:34.542624 systemd[1]: Started sshd@12-147.28.180.89:22-92.255.85.189:56520.service. Dec 13 14:39:34.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.89:22-92.255.85.189:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:34.632426 kernel: audit: type=1130 audit(1734100774.542:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.89:22-92.255.85.189:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:36.674000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.674000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002391230 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:36.890366 kernel: audit: type=1400 audit(1734100776.674:1361): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.890459 kernel: audit: type=1300 audit(1734100776.674:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002391230 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:36.890484 kernel: audit: type=1327 audit(1734100776.674:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:36.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:36.674000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:37.073279 kernel: audit: type=1400 audit(1734100776.674:1362): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:37.073327 kernel: audit: type=1300 audit(1734100776.674:1362): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d40220 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:36.674000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d40220 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:36.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:37.286537 kernel: audit: type=1327 audit(1734100776.674:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:37.286578 kernel: audit: type=1400 audit(1734100776.812:1363): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00fdfdac0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:37.569328 kernel: audit: type=1300 audit(1734100776.812:1363): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00fdfdac0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:37.569370 kernel: audit: type=1327 audit(1734100776.812:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01062d770 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009109680 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00fe89650 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f684640 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:36.812000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:36.812000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f410000 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:39:36.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:39:37.715629 sshd[6686]: Invalid user anonymous from 92.255.85.189 port 56520 Dec 13 14:39:37.976294 sshd[6686]: Failed none for invalid user anonymous from 92.255.85.189 port 56520 ssh2 Dec 13 14:39:38.201608 sshd[6686]: Connection closed by invalid user anonymous 92.255.85.189 port 56520 [preauth] Dec 13 14:39:38.202000 audit[6686]: USER_ERR pid=6686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=92.255.85.189 addr=92.255.85.189 terminal=ssh res=failed' Dec 13 14:39:38.204603 systemd[1]: sshd@12-147.28.180.89:22-92.255.85.189:56520.service: Deactivated successfully. Dec 13 14:39:38.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.89:22-92.255.85.189:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:39.468000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:39.468000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000466300 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:39.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:39.468000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:39.468000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d40260 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:39.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:39.468000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:39.468000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b2e300 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:39.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:39:39.473000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:39:39.473000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000466f20 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:39:39.473000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:27.732000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:40:27.776798 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 14:40:27.776908 kernel: audit: type=1400 audit(1734100827.732:1375): avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:40:27.732000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b88080 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:40:27.995088 kernel: audit: type=1300 audit(1734100827.732:1375): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b88080 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:40:27.995126 kernel: audit: type=1327 audit(1734100827.732:1375): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:40:27.732000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:40:31.837000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:40:31.837000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae4300 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:40:32.055565 kernel: audit: type=1400 audit(1734100831.837:1376): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:40:32.055602 kernel: audit: type=1300 audit(1734100831.837:1376): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae4300 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:40:32.055620 kernel: audit: type=1327 audit(1734100831.837:1376): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:40:31.837000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:40:36.675000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.675000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00222a4b0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:36.892088 kernel: audit: type=1400 audit(1734100836.675:1377): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.892156 kernel: audit: type=1300 audit(1734100836.675:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00222a4b0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:36.892174 kernel: audit: type=1327 audit(1734100836.675:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:36.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:36.985322 kernel: audit: type=1400 audit(1734100836.675:1378): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.675000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:37.075136 kernel: audit: type=1300 audit(1734100836.675:1378): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d41a00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:36.675000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d41a00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:37.195439 kernel: audit: type=1327 audit(1734100836.675:1378): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:36.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:37.288683 kernel: audit: type=1400 audit(1734100836.813:1379): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:37.379861 kernel: audit: type=1300 audit(1734100836.813:1379): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0059718f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0059718f0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:37.478085 kernel: audit: type=1327 audit(1734100836.813:1379): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:37.571914 kernel: audit: type=1400 audit(1734100836.813:1380): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0071bd280 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01046a750 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011080ba0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010a3d920 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:36.813000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:36.813000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c010f8dcb0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:40:36.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:40:39.469000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:39.469000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00161b720 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:39.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:39.469000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:39.469000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d41a40 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:39.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:39.469000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:39.469000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00161b740 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:39.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:40:39.474000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:40:39.474000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d986c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:40:39.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:27.734000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:41:27.762158 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:41:27.762238 kernel: audit: type=1400 audit(1734100887.734:1389): avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:41:27.734000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b68040 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:41:27.979170 kernel: audit: type=1300 audit(1734100887.734:1389): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b68040 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:41:27.979219 kernel: audit: type=1327 audit(1734100887.734:1389): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:41:27.734000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:41:31.837000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:41:31.837000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d320e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:41:31.933377 kernel: audit: type=1400 audit(1734100891.837:1390): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:41:31.933472 kernel: audit: type=1300 audit(1734100891.837:1390): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d320e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:41:31.837000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:41:32.149224 kernel: audit: type=1327 audit(1734100891.837:1390): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:41:36.676000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.676000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fa0480 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:36.891096 kernel: audit: type=1400 audit(1734100896.676:1391): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.891203 kernel: audit: type=1300 audit(1734100896.676:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fa0480 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:36.891241 kernel: audit: type=1327 audit(1734100896.676:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:36.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:36.676000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:37.073845 kernel: audit: type=1400 audit(1734100896.676:1392): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:37.073923 kernel: audit: type=1300 audit(1734100896.676:1392): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002919ee0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:36.676000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002919ee0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:36.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:37.287237 kernel: audit: type=1327 audit(1734100896.676:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:37.287323 kernel: audit: type=1400 audit(1734100896.814:1393): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f4b5170 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:37.476191 kernel: audit: type=1300 audit(1734100896.814:1393): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f4b5170 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:37.476239 kernel: audit: type=1327 audit(1734100896.814:1393): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:37.660532 kernel: audit: type=1400 audit(1734100896.814:1394): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0105458e0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f4b5200 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00fa17bc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01126a060 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:36.814000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:36.814000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0087a7bf0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:41:36.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:41:39.470000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:39.470000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00153fba0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:39.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:39.470000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:39.470000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002919f00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:39.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:39.470000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:39.470000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00161b760 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:39.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:41:39.475000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:41:39.475000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003024020 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:41:39.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:27.734000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:42:27.762433 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:42:27.762475 kernel: audit: type=1400 audit(1734100947.734:1403): avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:42:27.734000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b64d00 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:42:27.980650 kernel: audit: type=1300 audit(1734100947.734:1403): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b64d00 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:42:27.980679 kernel: audit: type=1327 audit(1734100947.734:1403): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:42:27.734000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:42:31.839000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:42:31.839000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d321e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:42:31.934407 kernel: audit: type=1400 audit(1734100951.839:1404): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:42:31.934470 kernel: audit: type=1300 audit(1734100951.839:1404): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d321e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:42:31.839000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:42:32.150082 kernel: audit: type=1327 audit(1734100951.839:1404): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:42:36.677000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.677000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.862739 kernel: audit: type=1400 audit(1734100956.677:1405): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.862816 kernel: audit: type=1400 audit(1734100956.677:1406): avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.862833 kernel: audit: type=1300 audit(1734100956.677:1406): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001386b00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:36.677000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001386b00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:36.982677 kernel: audit: type=1300 audit(1734100956.677:1405): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed5290 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:36.677000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed5290 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:36.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:37.195862 kernel: audit: type=1327 audit(1734100956.677:1406): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:37.195909 kernel: audit: type=1327 audit(1734100956.677:1405): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:36.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:37.288781 kernel: audit: type=1400 audit(1734100956.815:1407): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:37.379794 kernel: audit: type=1300 audit(1734100956.815:1407): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008ad7bf0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008ad7bf0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:37.477882 kernel: audit: type=1327 audit(1734100956.815:1407): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:37.571662 kernel: audit: type=1400 audit(1734100956.815:1408): avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010e41580 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c010c2cb40 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0051fdbc0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c01011f770 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00e0e4b10 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:42:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:42:39.471000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:39.471000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b3d9c0 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:39.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:39.471000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:39.471000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001386b80 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:39.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:39.471000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:39.471000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b3da00 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:39.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:42:39.475000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:42:39.475000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001386d40 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:42:39.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:10.191014 systemd[1]: Started sshd@13-147.28.180.89:22-139.178.89.65:51620.service. Dec 13 14:43:10.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.89:22-139.178.89.65:51620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:10.219627 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:43:10.219754 kernel: audit: type=1130 audit(1734100990.191:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.89:22-139.178.89.65:51620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:10.336000 audit[7194]: USER_ACCT pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.337556 sshd[7194]: Accepted publickey for core from 139.178.89.65 port 51620 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:10.340081 sshd[7194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:10.346325 systemd-logind[1555]: New session 12 of user core. Dec 13 14:43:10.350661 systemd[1]: Started session-12.scope. Dec 13 14:43:10.339000 audit[7194]: CRED_ACQ pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.438231 sshd[7194]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:10.439687 systemd[1]: sshd@13-147.28.180.89:22-139.178.89.65:51620.service: Deactivated successfully. Dec 13 14:43:10.440131 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:43:10.440512 systemd-logind[1555]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:43:10.440998 systemd-logind[1555]: Removed session 12. Dec 13 14:43:10.520616 kernel: audit: type=1101 audit(1734100990.336:1418): pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.520656 kernel: audit: type=1103 audit(1734100990.339:1419): pid=7194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.520672 kernel: audit: type=1006 audit(1734100990.339:1420): pid=7194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:43:10.579518 kernel: audit: type=1300 audit(1734100990.339:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff409fd3f0 a2=3 a3=0 items=0 ppid=1 pid=7194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:10.339000 audit[7194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff409fd3f0 a2=3 a3=0 items=0 ppid=1 pid=7194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:10.672151 kernel: audit: type=1327 audit(1734100990.339:1420): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:10.339000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:10.702942 kernel: audit: type=1105 audit(1734100990.356:1421): pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.356000 audit[7194]: USER_START pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.798150 kernel: audit: type=1103 audit(1734100990.358:1422): pid=7196 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.358000 audit[7196]: CRED_ACQ pid=7196 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.887240 kernel: audit: type=1106 audit(1734100990.438:1423): pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.438000 audit[7194]: USER_END pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.982552 kernel: audit: type=1104 audit(1734100990.438:1424): pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.438000 audit[7194]: CRED_DISP pid=7194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:10.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.89:22-139.178.89.65:51620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:15.447686 systemd[1]: Started sshd@14-147.28.180.89:22-139.178.89.65:51624.service. Dec 13 14:43:15.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.180.89:22-139.178.89.65:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:15.474729 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:43:15.474802 kernel: audit: type=1130 audit(1734100995.447:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.180.89:22-139.178.89.65:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:15.592000 audit[7227]: USER_ACCT pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.592755 sshd[7227]: Accepted publickey for core from 139.178.89.65 port 51624 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:15.594256 sshd[7227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:15.596406 systemd-logind[1555]: New session 13 of user core. Dec 13 14:43:15.597033 systemd[1]: Started session-13.scope. Dec 13 14:43:15.675883 sshd[7227]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:15.677536 systemd[1]: sshd@14-147.28.180.89:22-139.178.89.65:51624.service: Deactivated successfully. Dec 13 14:43:15.677992 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:43:15.678465 systemd-logind[1555]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:43:15.679062 systemd-logind[1555]: Removed session 13. Dec 13 14:43:15.593000 audit[7227]: CRED_ACQ pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.775439 kernel: audit: type=1101 audit(1734100995.592:1427): pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.775477 kernel: audit: type=1103 audit(1734100995.593:1428): pid=7227 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.775497 kernel: audit: type=1006 audit(1734100995.593:1429): pid=7227 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:43:15.833831 kernel: audit: type=1300 audit(1734100995.593:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd247b8140 a2=3 a3=0 items=0 ppid=1 pid=7227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:15.593000 audit[7227]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd247b8140 a2=3 a3=0 items=0 ppid=1 pid=7227 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:15.925605 kernel: audit: type=1327 audit(1734100995.593:1429): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:15.593000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:15.598000 audit[7227]: USER_START pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:16.050376 kernel: audit: type=1105 audit(1734100995.598:1430): pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:16.050411 kernel: audit: type=1103 audit(1734100995.599:1431): pid=7229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.599000 audit[7229]: CRED_ACQ pid=7229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.676000 audit[7227]: USER_END pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:16.234702 kernel: audit: type=1106 audit(1734100995.676:1432): pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:16.234739 kernel: audit: type=1104 audit(1734100995.676:1433): pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.676000 audit[7227]: CRED_DISP pid=7227 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:15.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.180.89:22-139.178.89.65:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:20.685617 systemd[1]: Started sshd@15-147.28.180.89:22-139.178.89.65:33400.service. Dec 13 14:43:20.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.180.89:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:20.712577 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:43:20.712652 kernel: audit: type=1130 audit(1734101000.685:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.180.89:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:20.829000 audit[7279]: USER_ACCT pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.829847 sshd[7279]: Accepted publickey for core from 139.178.89.65 port 33400 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:20.831303 sshd[7279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:20.833514 systemd-logind[1555]: New session 14 of user core. Dec 13 14:43:20.834158 systemd[1]: Started session-14.scope. Dec 13 14:43:20.911428 sshd[7279]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:20.912965 systemd[1]: sshd@15-147.28.180.89:22-139.178.89.65:33400.service: Deactivated successfully. Dec 13 14:43:20.913434 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:43:20.913828 systemd-logind[1555]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:43:20.914273 systemd-logind[1555]: Removed session 14. Dec 13 14:43:20.830000 audit[7279]: CRED_ACQ pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.011263 kernel: audit: type=1101 audit(1734101000.829:1436): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.011307 kernel: audit: type=1103 audit(1734101000.830:1437): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.011325 kernel: audit: type=1006 audit(1734101000.830:1438): pid=7279 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:43:20.830000 audit[7279]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3912a080 a2=3 a3=0 items=0 ppid=1 pid=7279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:21.161764 kernel: audit: type=1300 audit(1734101000.830:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3912a080 a2=3 a3=0 items=0 ppid=1 pid=7279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:21.161834 kernel: audit: type=1327 audit(1734101000.830:1438): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:20.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:21.192264 kernel: audit: type=1105 audit(1734101000.835:1439): pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.835000 audit[7279]: USER_START pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.286492 kernel: audit: type=1103 audit(1734101000.836:1440): pid=7281 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.836000 audit[7281]: CRED_ACQ pid=7281 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.375432 kernel: audit: type=1106 audit(1734101000.911:1441): pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.911000 audit[7279]: USER_END pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:21.470683 kernel: audit: type=1104 audit(1734101000.911:1442): pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.911000 audit[7279]: CRED_DISP pid=7279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:20.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.180.89:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:25.921911 systemd[1]: Started sshd@16-147.28.180.89:22-139.178.89.65:33404.service. Dec 13 14:43:25.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.89:22-139.178.89.65:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:25.948775 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:43:25.948844 kernel: audit: type=1130 audit(1734101005.921:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.89:22-139.178.89.65:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:25.986448 update_engine[1557]: I1213 14:43:25.986394 1557 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:43:25.986448 update_engine[1557]: I1213 14:43:25.986434 1557 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:43:25.987787 update_engine[1557]: I1213 14:43:25.987748 1557 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:43:25.987969 update_engine[1557]: I1213 14:43:25.987933 1557 omaha_request_params.cc:62] Current group set to lts Dec 13 14:43:25.988006 update_engine[1557]: I1213 14:43:25.988000 1557 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:43:25.988006 update_engine[1557]: I1213 14:43:25.988004 1557 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:43:25.988070 update_engine[1557]: I1213 14:43:25.988035 1557 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:43:25.988070 update_engine[1557]: I1213 14:43:25.988049 1557 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:43:25.988149 update_engine[1557]: I1213 14:43:25.988093 1557 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:43:25.988149 update_engine[1557]: I1213 14:43:25.988096 1557 omaha_request_action.cc:271] Request: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: Dec 13 14:43:25.988149 update_engine[1557]: I1213 14:43:25.988098 1557 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:43:25.988447 locksmithd[1599]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:43:25.988830 update_engine[1557]: I1213 14:43:25.988794 1557 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:43:25.988893 update_engine[1557]: E1213 14:43:25.988842 1557 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:43:25.988941 update_engine[1557]: I1213 14:43:25.988894 1557 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:43:26.066000 audit[7307]: USER_ACCT pid=7307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.067007 sshd[7307]: Accepted publickey for core from 139.178.89.65 port 33404 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:26.068512 sshd[7307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:26.070767 systemd-logind[1555]: New session 15 of user core. Dec 13 14:43:26.071339 systemd[1]: Started session-15.scope. Dec 13 14:43:26.152288 sshd[7307]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:26.154154 systemd[1]: sshd@16-147.28.180.89:22-139.178.89.65:33404.service: Deactivated successfully. Dec 13 14:43:26.154560 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:43:26.155007 systemd-logind[1555]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:43:26.155681 systemd[1]: Started sshd@17-147.28.180.89:22-139.178.89.65:33410.service. Dec 13 14:43:26.156209 systemd-logind[1555]: Removed session 15. Dec 13 14:43:26.067000 audit[7307]: CRED_ACQ pid=7307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.250179 kernel: audit: type=1101 audit(1734101006.066:1445): pid=7307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.250217 kernel: audit: type=1103 audit(1734101006.067:1446): pid=7307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.250233 kernel: audit: type=1006 audit(1734101006.067:1447): pid=7307 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:43:26.308631 kernel: audit: type=1300 audit(1734101006.067:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6513a6d0 a2=3 a3=0 items=0 ppid=1 pid=7307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:26.067000 audit[7307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6513a6d0 a2=3 a3=0 items=0 ppid=1 pid=7307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:26.336682 sshd[7332]: Accepted publickey for core from 139.178.89.65 port 33410 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:26.337663 sshd[7332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:26.340317 systemd-logind[1555]: New session 16 of user core. Dec 13 14:43:26.340874 systemd[1]: Started session-16.scope. Dec 13 14:43:26.067000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:26.430979 kernel: audit: type=1327 audit(1734101006.067:1447): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:26.431050 kernel: audit: type=1105 audit(1734101006.073:1448): pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.073000 audit[7307]: USER_START pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.074000 audit[7309]: CRED_ACQ pid=7309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.614102 kernel: audit: type=1103 audit(1734101006.074:1449): pid=7309 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.614140 kernel: audit: type=1106 audit(1734101006.152:1450): pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.152000 audit[7307]: USER_END pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.616098 sshd[7332]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:26.617936 systemd[1]: sshd@17-147.28.180.89:22-139.178.89.65:33410.service: Deactivated successfully. Dec 13 14:43:26.618325 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:43:26.618653 systemd-logind[1555]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:43:26.619305 systemd[1]: Started sshd@18-147.28.180.89:22-139.178.89.65:33416.service. Dec 13 14:43:26.619760 systemd-logind[1555]: Removed session 16. Dec 13 14:43:26.152000 audit[7307]: CRED_DISP pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.737413 sshd[7355]: Accepted publickey for core from 139.178.89.65 port 33416 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:26.738650 sshd[7355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:26.741584 systemd-logind[1555]: New session 17 of user core. Dec 13 14:43:26.742062 systemd[1]: Started session-17.scope. Dec 13 14:43:26.798440 kernel: audit: type=1104 audit(1734101006.152:1451): pid=7307 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.89:22-139.178.89.65:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:26.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.180.89:22-139.178.89.65:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:26.336000 audit[7332]: USER_ACCT pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.337000 audit[7332]: CRED_ACQ pid=7332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.337000 audit[7332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94c19420 a2=3 a3=0 items=0 ppid=1 pid=7332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:26.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:26.342000 audit[7332]: USER_START pid=7332 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.343000 audit[7334]: CRED_ACQ pid=7334 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.616000 audit[7332]: USER_END pid=7332 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.616000 audit[7332]: CRED_DISP pid=7332 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.180.89:22-139.178.89.65:33410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:26.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.180.89:22-139.178.89.65:33416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:26.736000 audit[7355]: USER_ACCT pid=7355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.738000 audit[7355]: CRED_ACQ pid=7355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.738000 audit[7355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe938239c0 a2=3 a3=0 items=0 ppid=1 pid=7355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:26.738000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:26.744000 audit[7355]: USER_START pid=7355 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.745000 audit[7357]: CRED_ACQ pid=7357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.820766 sshd[7355]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:26.821000 audit[7355]: USER_END pid=7355 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.821000 audit[7355]: CRED_DISP pid=7355 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:26.822207 systemd[1]: sshd@18-147.28.180.89:22-139.178.89.65:33416.service: Deactivated successfully. Dec 13 14:43:26.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.180.89:22-139.178.89.65:33416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:26.822639 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:43:26.822981 systemd-logind[1555]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:43:26.823442 systemd-logind[1555]: Removed session 17. Dec 13 14:43:27.735000 audit[5206]: AVC avc: denied { watch } for pid=5206 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.2302561070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c827 tclass=file permissive=0 Dec 13 14:43:27.735000 audit[5206]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0021852a0 a2=fc6 a3=0 items=0 ppid=4369 pid=5206 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c827 key=(null) Dec 13 14:43:27.735000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:43:31.832214 systemd[1]: Started sshd@19-147.28.180.89:22-139.178.89.65:52914.service. Dec 13 14:43:31.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.89:22-139.178.89.65:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:31.859721 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:43:31.859796 kernel: audit: type=1130 audit(1734101011.832:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.89:22-139.178.89.65:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:31.839000 audit[5729]: AVC avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:43:31.977646 sshd[7385]: Accepted publickey for core from 139.178.89.65 port 52914 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:31.978660 sshd[7385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:31.980840 systemd-logind[1555]: New session 18 of user core. Dec 13 14:43:31.981508 systemd[1]: Started session-18.scope. Dec 13 14:43:32.042780 kernel: audit: type=1400 audit(1734101011.839:1473): avc: denied { watch } for pid=5729 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_09.1446654248/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c973 tclass=file permissive=0 Dec 13 14:43:32.042854 kernel: audit: type=1300 audit(1734101011.839:1473): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016fc540 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:43:31.839000 audit[5729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016fc540 a2=fc6 a3=0 items=0 ppid=5115 pid=5729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c973 key=(null) Dec 13 14:43:32.060050 sshd[7385]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:32.061445 systemd[1]: sshd@19-147.28.180.89:22-139.178.89.65:52914.service: Deactivated successfully. Dec 13 14:43:32.061878 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:43:32.062231 systemd-logind[1555]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:43:32.062899 systemd-logind[1555]: Removed session 18. Dec 13 14:43:32.162640 kernel: audit: type=1327 audit(1734101011.839:1473): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:43:31.839000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:43:31.977000 audit[7385]: USER_ACCT pid=7385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.346500 kernel: audit: type=1101 audit(1734101011.977:1474): pid=7385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.346546 kernel: audit: type=1103 audit(1734101011.978:1475): pid=7385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:31.978000 audit[7385]: CRED_ACQ pid=7385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.436728 kernel: audit: type=1006 audit(1734101011.978:1476): pid=7385 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:43:32.495664 kernel: audit: type=1300 audit(1734101011.978:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc232d2070 a2=3 a3=0 items=0 ppid=1 pid=7385 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:31.978000 audit[7385]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc232d2070 a2=3 a3=0 items=0 ppid=1 pid=7385 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:32.588179 kernel: audit: type=1327 audit(1734101011.978:1476): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:31.978000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:32.618857 kernel: audit: type=1105 audit(1734101011.983:1477): pid=7385 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:31.983000 audit[7385]: USER_START pid=7385 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:31.984000 audit[7388]: CRED_ACQ pid=7388 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.060000 audit[7385]: USER_END pid=7385 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.060000 audit[7385]: CRED_DISP pid=7385 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:32.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.89:22-139.178.89.65:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:35.741626 systemd[1]: Started sshd@20-147.28.180.89:22-159.89.121.123:45142.service. Dec 13 14:43:35.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.180.89:22-159.89.121.123:45142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:35.799379 sshd[7411]: kex_exchange_identification: Connection closed by remote host Dec 13 14:43:35.799379 sshd[7411]: Connection closed by 159.89.121.123 port 45142 Dec 13 14:43:35.800527 systemd[1]: sshd@20-147.28.180.89:22-159.89.121.123:45142.service: Deactivated successfully. Dec 13 14:43:35.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.180.89:22-159.89.121.123:45142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:35.984564 update_engine[1557]: I1213 14:43:35.984448 1557 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:43:35.985346 update_engine[1557]: I1213 14:43:35.984938 1557 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:43:35.985346 update_engine[1557]: E1213 14:43:35.985138 1557 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:43:35.985346 update_engine[1557]: I1213 14:43:35.985306 1557 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Dec 13 14:43:36.678000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.678000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e16c90 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:36.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:36.678000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.678000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e27640 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:36.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:36.815000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.815000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00f6ca300 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:36.816000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.816000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0076621b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:36.816000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.816000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00faf3f80 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:36.816000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.816000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.816000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c006bf9ec0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.816000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010b6bc20 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:36.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:36.816000 audit[2444]: AVC avc: denied { watch } for pid=2444 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:36.816000 audit[2444]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c01106d9b0 a2=fc6 a3=0 items=0 ppid=2276 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c474 key=(null) Dec 13 14:43:36.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:43:37.069471 systemd[1]: Started sshd@21-147.28.180.89:22-139.178.89.65:52930.service. Dec 13 14:43:37.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.180.89:22-139.178.89.65:52930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:37.095913 kernel: kauditd_printk_skb: 30 callbacks suppressed Dec 13 14:43:37.095965 kernel: audit: type=1130 audit(1734101017.069:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.180.89:22-139.178.89.65:52930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:37.213000 audit[7434]: USER_ACCT pid=7434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.214748 sshd[7434]: Accepted publickey for core from 139.178.89.65 port 52930 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:37.218933 sshd[7434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:37.223514 systemd-logind[1555]: New session 19 of user core. Dec 13 14:43:37.224186 systemd[1]: Started session-19.scope. Dec 13 14:43:37.301746 sshd[7434]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:37.303131 systemd[1]: sshd@21-147.28.180.89:22-139.178.89.65:52930.service: Deactivated successfully. Dec 13 14:43:37.303561 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:43:37.303867 systemd-logind[1555]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:43:37.304655 systemd-logind[1555]: Removed session 19. Dec 13 14:43:37.217000 audit[7434]: CRED_ACQ pid=7434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.396549 kernel: audit: type=1101 audit(1734101017.213:1493): pid=7434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.396590 kernel: audit: type=1103 audit(1734101017.217:1494): pid=7434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.396609 kernel: audit: type=1006 audit(1734101017.217:1495): pid=7434 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:43:37.217000 audit[7434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff225942f0 a2=3 a3=0 items=0 ppid=1 pid=7434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:37.547317 kernel: audit: type=1300 audit(1734101017.217:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff225942f0 a2=3 a3=0 items=0 ppid=1 pid=7434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:37.547366 kernel: audit: type=1327 audit(1734101017.217:1495): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:37.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:37.577861 kernel: audit: type=1105 audit(1734101017.225:1496): pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.225000 audit[7434]: USER_START pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.672532 kernel: audit: type=1103 audit(1734101017.226:1497): pid=7436 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.226000 audit[7436]: CRED_ACQ pid=7436 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.761751 kernel: audit: type=1106 audit(1734101017.302:1498): pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.302000 audit[7434]: USER_END pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.857329 kernel: audit: type=1104 audit(1734101017.302:1499): pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.302000 audit[7434]: CRED_DISP pid=7434 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:37.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.180.89:22-139.178.89.65:52930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:39.472000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:39.472000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00303c360 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:39.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:39.472000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:39.472000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f9e000 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:39.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:39.472000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:39.472000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f94040 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:39.472000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:39.477000 audit[2445]: AVC avc: denied { watch } for pid=2445 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:43:39.477000 audit[2445]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00303c500 a2=fc6 a3=0 items=0 ppid=2285 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c957 key=(null) Dec 13 14:43:39.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:43:42.311276 systemd[1]: Started sshd@22-147.28.180.89:22-139.178.89.65:41560.service. Dec 13 14:43:42.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.180.89:22-139.178.89.65:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:42.338562 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:43:42.338659 kernel: audit: type=1130 audit(1734101022.311:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.180.89:22-139.178.89.65:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:42.454000 audit[7477]: USER_ACCT pid=7477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.454869 sshd[7477]: Accepted publickey for core from 139.178.89.65 port 41560 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:42.456668 sshd[7477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:42.459106 systemd-logind[1555]: New session 20 of user core. Dec 13 14:43:42.459578 systemd[1]: Started session-20.scope. Dec 13 14:43:42.538139 sshd[7477]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:42.539622 systemd[1]: sshd@22-147.28.180.89:22-139.178.89.65:41560.service: Deactivated successfully. Dec 13 14:43:42.540053 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:43:42.540328 systemd-logind[1555]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:43:42.540934 systemd-logind[1555]: Removed session 20. Dec 13 14:43:42.456000 audit[7477]: CRED_ACQ pid=7477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.636249 kernel: audit: type=1101 audit(1734101022.454:1506): pid=7477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.636285 kernel: audit: type=1103 audit(1734101022.456:1507): pid=7477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.636302 kernel: audit: type=1006 audit(1734101022.456:1508): pid=7477 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 14:43:42.694595 kernel: audit: type=1300 audit(1734101022.456:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb50f170 a2=3 a3=0 items=0 ppid=1 pid=7477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:42.456000 audit[7477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb50f170 a2=3 a3=0 items=0 ppid=1 pid=7477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:42.786239 kernel: audit: type=1327 audit(1734101022.456:1508): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:42.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:42.816712 kernel: audit: type=1105 audit(1734101022.461:1509): pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.461000 audit[7477]: USER_START pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.911430 kernel: audit: type=1103 audit(1734101022.462:1510): pid=7497 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.462000 audit[7497]: CRED_ACQ pid=7497 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.538000 audit[7477]: USER_END pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:43.095760 kernel: audit: type=1106 audit(1734101022.538:1511): pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:43.095801 kernel: audit: type=1104 audit(1734101022.538:1512): pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.538000 audit[7477]: CRED_DISP pid=7477 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:42.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.180.89:22-139.178.89.65:41560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:45.984593 update_engine[1557]: I1213 14:43:45.984480 1557 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:43:45.985477 update_engine[1557]: I1213 14:43:45.984987 1557 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:43:45.985477 update_engine[1557]: E1213 14:43:45.985188 1557 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:43:45.985477 update_engine[1557]: I1213 14:43:45.985394 1557 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Dec 13 14:43:47.547906 systemd[1]: Started sshd@23-147.28.180.89:22-139.178.89.65:41572.service. Dec 13 14:43:47.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.180.89:22-139.178.89.65:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:47.574941 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:43:47.575049 kernel: audit: type=1130 audit(1734101027.547:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.180.89:22-139.178.89.65:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:47.692000 audit[7520]: USER_ACCT pid=7520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.693320 sshd[7520]: Accepted publickey for core from 139.178.89.65 port 41572 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:47.694484 sshd[7520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:47.696977 systemd-logind[1555]: New session 21 of user core. Dec 13 14:43:47.697475 systemd[1]: Started session-21.scope. Dec 13 14:43:47.776561 sshd[7520]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:47.777992 systemd[1]: sshd@23-147.28.180.89:22-139.178.89.65:41572.service: Deactivated successfully. Dec 13 14:43:47.778432 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:43:47.778810 systemd-logind[1555]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:43:47.779234 systemd-logind[1555]: Removed session 21. Dec 13 14:43:47.693000 audit[7520]: CRED_ACQ pid=7520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.876125 kernel: audit: type=1101 audit(1734101027.692:1515): pid=7520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.876162 kernel: audit: type=1103 audit(1734101027.693:1516): pid=7520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.876179 kernel: audit: type=1006 audit(1734101027.693:1517): pid=7520 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 14:43:47.878277 systemd[1]: Started sshd@24-147.28.180.89:22-139.178.89.65:41584.service. Dec 13 14:43:47.934725 kernel: audit: type=1300 audit(1734101027.693:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40a3acc0 a2=3 a3=0 items=0 ppid=1 pid=7520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:47.693000 audit[7520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40a3acc0 a2=3 a3=0 items=0 ppid=1 pid=7520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:48.026558 kernel: audit: type=1327 audit(1734101027.693:1517): proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:47.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:48.057021 kernel: audit: type=1105 audit(1734101027.699:1518): pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.699000 audit[7520]: USER_START pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.151222 kernel: audit: type=1103 audit(1734101027.700:1519): pid=7522 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.700000 audit[7522]: CRED_ACQ pid=7522 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.240118 kernel: audit: type=1106 audit(1734101027.776:1520): pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.776000 audit[7520]: USER_END pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.335362 kernel: audit: type=1104 audit(1734101027.776:1521): pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.776000 audit[7520]: CRED_DISP pid=7520 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:47.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.180.89:22-139.178.89.65:41572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:47.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.180.89:22-139.178.89.65:41584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:48.432000 audit[7545]: USER_ACCT pid=7545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.432689 sshd[7545]: Accepted publickey for core from 139.178.89.65 port 41584 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:48.432000 audit[7545]: CRED_ACQ pid=7545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.432000 audit[7545]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe648efa20 a2=3 a3=0 items=0 ppid=1 pid=7545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:48.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:48.433411 sshd[7545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:48.435824 systemd-logind[1555]: New session 22 of user core. Dec 13 14:43:48.436263 systemd[1]: Started session-22.scope. Dec 13 14:43:48.438000 audit[7545]: USER_START pid=7545 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.438000 audit[7548]: CRED_ACQ pid=7548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.535182 sshd[7545]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:48.535000 audit[7545]: USER_END pid=7545 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.535000 audit[7545]: CRED_DISP pid=7545 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.536956 systemd[1]: sshd@24-147.28.180.89:22-139.178.89.65:41584.service: Deactivated successfully. Dec 13 14:43:48.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.180.89:22-139.178.89.65:41584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:48.537303 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:43:48.537702 systemd-logind[1555]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:43:48.538242 systemd[1]: Started sshd@25-147.28.180.89:22-139.178.89.65:56658.service. Dec 13 14:43:48.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.180.89:22-139.178.89.65:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:48.538791 systemd-logind[1555]: Removed session 22. Dec 13 14:43:48.572000 audit[7566]: USER_ACCT pid=7566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.573445 sshd[7566]: Accepted publickey for core from 139.178.89.65 port 56658 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:48.574000 audit[7566]: CRED_ACQ pid=7566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.575000 audit[7566]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd05e1d9b0 a2=3 a3=0 items=0 ppid=1 pid=7566 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:48.575000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:48.576299 sshd[7566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:48.586314 systemd-logind[1555]: New session 23 of user core. Dec 13 14:43:48.588913 systemd[1]: Started session-23.scope. Dec 13 14:43:48.605000 audit[7566]: USER_START pid=7566 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:48.608000 audit[7576]: CRED_ACQ pid=7576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.663000 audit[7622]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=7622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:49.663000 audit[7622]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe00e92860 a2=0 a3=7ffe00e9284c items=0 ppid=2897 pid=7622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:49.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:49.675000 audit[7622]: NETFILTER_CFG table=nat:114 family=2 entries=22 op=nft_register_rule pid=7622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:49.675000 audit[7622]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe00e92860 a2=0 a3=0 items=0 ppid=2897 pid=7622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:49.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:49.690272 sshd[7566]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:49.693000 audit[7566]: USER_END pid=7566 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.693000 audit[7566]: CRED_DISP pid=7566 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.699701 systemd[1]: sshd@25-147.28.180.89:22-139.178.89.65:56658.service: Deactivated successfully. Dec 13 14:43:49.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.180.89:22-139.178.89.65:56658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:49.702645 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:43:49.705140 systemd-logind[1555]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:43:49.707000 audit[7627]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=7627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:49.707000 audit[7627]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdacd3ba80 a2=0 a3=7ffdacd3ba6c items=0 ppid=2897 pid=7627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:49.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:49.709417 systemd[1]: Started sshd@26-147.28.180.89:22-139.178.89.65:56662.service. Dec 13 14:43:49.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.180.89:22-139.178.89.65:56662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:49.712316 systemd-logind[1555]: Removed session 23. Dec 13 14:43:49.719000 audit[7627]: NETFILTER_CFG table=nat:116 family=2 entries=22 op=nft_register_rule pid=7627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:49.719000 audit[7627]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdacd3ba80 a2=0 a3=0 items=0 ppid=2897 pid=7627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:49.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:49.758000 audit[7628]: USER_ACCT pid=7628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.759251 sshd[7628]: Accepted publickey for core from 139.178.89.65 port 56662 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:49.759000 audit[7628]: CRED_ACQ pid=7628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.759000 audit[7628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdae009ca0 a2=3 a3=0 items=0 ppid=1 pid=7628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:49.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:49.760652 sshd[7628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:49.765155 systemd-logind[1555]: New session 24 of user core. Dec 13 14:43:49.766247 systemd[1]: Started session-24.scope. Dec 13 14:43:49.771000 audit[7628]: USER_START pid=7628 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.772000 audit[7630]: CRED_ACQ pid=7630 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.970902 sshd[7628]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:49.971000 audit[7628]: USER_END pid=7628 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.971000 audit[7628]: CRED_DISP pid=7628 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:49.972928 systemd[1]: sshd@26-147.28.180.89:22-139.178.89.65:56662.service: Deactivated successfully. Dec 13 14:43:49.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.180.89:22-139.178.89.65:56662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:49.973314 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:43:49.973693 systemd-logind[1555]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:43:49.974364 systemd[1]: Started sshd@27-147.28.180.89:22-139.178.89.65:56674.service. Dec 13 14:43:49.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.28.180.89:22-139.178.89.65:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:49.974981 systemd-logind[1555]: Removed session 24. Dec 13 14:43:50.009000 audit[7651]: USER_ACCT pid=7651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.009700 sshd[7651]: Accepted publickey for core from 139.178.89.65 port 56674 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:50.010000 audit[7651]: CRED_ACQ pid=7651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.010000 audit[7651]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90c88290 a2=3 a3=0 items=0 ppid=1 pid=7651 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:50.010000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:50.010853 sshd[7651]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:50.014927 systemd-logind[1555]: New session 25 of user core. Dec 13 14:43:50.015950 systemd[1]: Started session-25.scope. Dec 13 14:43:50.021000 audit[7651]: USER_START pid=7651 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.023000 audit[7654]: CRED_ACQ pid=7654 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.148340 sshd[7651]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:50.148000 audit[7651]: USER_END pid=7651 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.148000 audit[7651]: CRED_DISP pid=7651 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:50.149844 systemd[1]: sshd@27-147.28.180.89:22-139.178.89.65:56674.service: Deactivated successfully. Dec 13 14:43:50.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.28.180.89:22-139.178.89.65:56674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:50.150290 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:43:50.150708 systemd-logind[1555]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:43:50.151204 systemd-logind[1555]: Removed session 25. Dec 13 14:43:54.225000 audit[7684]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=7684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:54.266873 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 14:43:54.266986 kernel: audit: type=1325 audit(1734101034.225:1563): table=filter:117 family=2 entries=20 op=nft_register_rule pid=7684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:54.225000 audit[7684]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcfd0d0170 a2=0 a3=7ffcfd0d015c items=0 ppid=2897 pid=7684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:54.421536 kernel: audit: type=1300 audit(1734101034.225:1563): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcfd0d0170 a2=0 a3=7ffcfd0d015c items=0 ppid=2897 pid=7684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:54.421595 kernel: audit: type=1327 audit(1734101034.225:1563): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:54.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:54.494000 audit[7684]: NETFILTER_CFG table=nat:118 family=2 entries=106 op=nft_register_chain pid=7684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:54.494000 audit[7684]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcfd0d0170 a2=0 a3=7ffcfd0d015c items=0 ppid=2897 pid=7684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:54.650903 kernel: audit: type=1325 audit(1734101034.494:1564): table=nat:118 family=2 entries=106 op=nft_register_chain pid=7684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:43:54.650940 kernel: audit: type=1300 audit(1734101034.494:1564): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcfd0d0170 a2=0 a3=7ffcfd0d015c items=0 ppid=2897 pid=7684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:54.650958 kernel: audit: type=1327 audit(1734101034.494:1564): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:54.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:43:55.160913 systemd[1]: Started sshd@28-147.28.180.89:22-139.178.89.65:56686.service. Dec 13 14:43:55.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.28.180.89:22-139.178.89.65:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:55.256384 kernel: audit: type=1130 audit(1734101035.161:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.28.180.89:22-139.178.89.65:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:55.284000 audit[7687]: USER_ACCT pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.284730 sshd[7687]: Accepted publickey for core from 139.178.89.65 port 56686 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:43:55.285949 sshd[7687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:43:55.288672 systemd-logind[1555]: New session 26 of user core. Dec 13 14:43:55.289136 systemd[1]: Started session-26.scope. Dec 13 14:43:55.365399 sshd[7687]: pam_unix(sshd:session): session closed for user core Dec 13 14:43:55.366863 systemd[1]: sshd@28-147.28.180.89:22-139.178.89.65:56686.service: Deactivated successfully. Dec 13 14:43:55.367286 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:43:55.367694 systemd-logind[1555]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:43:55.368188 systemd-logind[1555]: Removed session 26. Dec 13 14:43:55.285000 audit[7687]: CRED_ACQ pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.468157 kernel: audit: type=1101 audit(1734101035.284:1566): pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.468198 kernel: audit: type=1103 audit(1734101035.285:1567): pid=7687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.468216 kernel: audit: type=1006 audit(1734101035.285:1568): pid=7687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:43:55.285000 audit[7687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff47720540 a2=3 a3=0 items=0 ppid=1 pid=7687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:43:55.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:43:55.290000 audit[7687]: USER_START pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.291000 audit[7689]: CRED_ACQ pid=7689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.365000 audit[7687]: USER_END pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.365000 audit[7687]: CRED_DISP pid=7687 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:43:55.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.28.180.89:22-139.178.89.65:56686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:43:55.981690 update_engine[1557]: I1213 14:43:55.981467 1557 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:43:55.982513 update_engine[1557]: I1213 14:43:55.981963 1557 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:43:55.982513 update_engine[1557]: E1213 14:43:55.982172 1557 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:43:55.982513 update_engine[1557]: I1213 14:43:55.982317 1557 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:43:55.982513 update_engine[1557]: I1213 14:43:55.982332 1557 omaha_request_action.cc:621] Omaha request response: Dec 13 14:43:55.982513 update_engine[1557]: E1213 14:43:55.982501 1557 omaha_request_action.cc:640] Omaha request network transfer failed. Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982530 1557 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982540 1557 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982550 1557 update_attempter.cc:306] Processing Done. Dec 13 14:43:55.983015 update_engine[1557]: E1213 14:43:55.982575 1557 update_attempter.cc:619] Update failed. Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982584 1557 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982592 1557 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982602 1557 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982756 1557 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982822 1557 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982842 1557 omaha_request_action.cc:271] Request: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: Dec 13 14:43:55.983015 update_engine[1557]: I1213 14:43:55.982858 1557 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983249 1557 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:43:55.984634 update_engine[1557]: E1213 14:43:55.983451 1557 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983587 1557 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983603 1557 omaha_request_action.cc:621] Omaha request response: Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983613 1557 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983621 1557 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983629 1557 update_attempter.cc:306] Processing Done. Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983637 1557 update_attempter.cc:310] Error event sent. Dec 13 14:43:55.984634 update_engine[1557]: I1213 14:43:55.983659 1557 update_check_scheduler.cc:74] Next update check in 43m2s Dec 13 14:43:55.985514 locksmithd[1599]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Dec 13 14:43:55.985514 locksmithd[1599]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Dec 13 14:44:00.374989 systemd[1]: Started sshd@29-147.28.180.89:22-139.178.89.65:37948.service. Dec 13 14:44:00.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.28.180.89:22-139.178.89.65:37948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:00.402171 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:44:00.402235 kernel: audit: type=1130 audit(1734101040.374:1574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.28.180.89:22-139.178.89.65:37948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:00.520000 audit[7711]: USER_ACCT pid=7711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.520700 sshd[7711]: Accepted publickey for core from 139.178.89.65 port 37948 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:44:00.521333 sshd[7711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:44:00.523744 systemd-logind[1555]: New session 27 of user core. Dec 13 14:44:00.524160 systemd[1]: Started session-27.scope. Dec 13 14:44:00.600027 sshd[7711]: pam_unix(sshd:session): session closed for user core Dec 13 14:44:00.601433 systemd[1]: sshd@29-147.28.180.89:22-139.178.89.65:37948.service: Deactivated successfully. Dec 13 14:44:00.601860 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:44:00.602181 systemd-logind[1555]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:44:00.602703 systemd-logind[1555]: Removed session 27. Dec 13 14:44:00.520000 audit[7711]: CRED_ACQ pid=7711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.703147 kernel: audit: type=1101 audit(1734101040.520:1575): pid=7711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.703184 kernel: audit: type=1103 audit(1734101040.520:1576): pid=7711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.703203 kernel: audit: type=1006 audit(1734101040.520:1577): pid=7711 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:44:00.762136 kernel: audit: type=1300 audit(1734101040.520:1577): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda885f7b0 a2=3 a3=0 items=0 ppid=1 pid=7711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:00.520000 audit[7711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda885f7b0 a2=3 a3=0 items=0 ppid=1 pid=7711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:00.854716 kernel: audit: type=1327 audit(1734101040.520:1577): proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:00.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:00.526000 audit[7711]: USER_START pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.980382 kernel: audit: type=1105 audit(1734101040.526:1578): pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.980417 kernel: audit: type=1103 audit(1734101040.526:1579): pid=7713 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.526000 audit[7713]: CRED_ACQ pid=7713 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:01.069437 kernel: audit: type=1106 audit(1734101040.600:1580): pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.600000 audit[7711]: USER_END pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:01.165431 kernel: audit: type=1104 audit(1734101040.600:1581): pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.600000 audit[7711]: CRED_DISP pid=7711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:00.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.28.180.89:22-139.178.89.65:37948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:05.612453 systemd[1]: Started sshd@30-147.28.180.89:22-139.178.89.65:37956.service. Dec 13 14:44:05.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.28.180.89:22-139.178.89.65:37956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:05.640259 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:44:05.640343 kernel: audit: type=1130 audit(1734101045.612:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.28.180.89:22-139.178.89.65:37956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:05.758000 audit[7736]: USER_ACCT pid=7736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.758802 sshd[7736]: Accepted publickey for core from 139.178.89.65 port 37956 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:44:05.760434 sshd[7736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:44:05.762813 systemd-logind[1555]: New session 28 of user core. Dec 13 14:44:05.763303 systemd[1]: Started session-28.scope. Dec 13 14:44:05.842436 sshd[7736]: pam_unix(sshd:session): session closed for user core Dec 13 14:44:05.844002 systemd[1]: sshd@30-147.28.180.89:22-139.178.89.65:37956.service: Deactivated successfully. Dec 13 14:44:05.844528 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:44:05.844914 systemd-logind[1555]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:44:05.845452 systemd-logind[1555]: Removed session 28. Dec 13 14:44:05.759000 audit[7736]: CRED_ACQ pid=7736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.943062 kernel: audit: type=1101 audit(1734101045.758:1584): pid=7736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.943101 kernel: audit: type=1103 audit(1734101045.759:1585): pid=7736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.943119 kernel: audit: type=1006 audit(1734101045.759:1586): pid=7736 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:44:06.001554 kernel: audit: type=1300 audit(1734101045.759:1586): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9da6c7f0 a2=3 a3=0 items=0 ppid=1 pid=7736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:05.759000 audit[7736]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9da6c7f0 a2=3 a3=0 items=0 ppid=1 pid=7736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:06.093438 kernel: audit: type=1327 audit(1734101045.759:1586): proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:05.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:06.123892 kernel: audit: type=1105 audit(1734101045.765:1587): pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.765000 audit[7736]: USER_START pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:06.218064 kernel: audit: type=1103 audit(1734101045.765:1588): pid=7738 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.765000 audit[7738]: CRED_ACQ pid=7738 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:06.307006 kernel: audit: type=1106 audit(1734101045.842:1589): pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.842000 audit[7736]: USER_END pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:06.402226 kernel: audit: type=1104 audit(1734101045.842:1590): pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.842000 audit[7736]: CRED_DISP pid=7736 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:05.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.28.180.89:22-139.178.89.65:37956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:10.851971 systemd[1]: Started sshd@31-147.28.180.89:22-139.178.89.65:35398.service. Dec 13 14:44:10.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.28.180.89:22-139.178.89.65:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:10.879064 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:44:10.879143 kernel: audit: type=1130 audit(1734101050.851:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.28.180.89:22-139.178.89.65:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:44:10.997000 audit[7779]: USER_ACCT pid=7779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:10.997853 sshd[7779]: Accepted publickey for core from 139.178.89.65 port 35398 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 14:44:11.000180 sshd[7779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:44:11.005078 systemd-logind[1555]: New session 29 of user core. Dec 13 14:44:11.005660 systemd[1]: Started session-29.scope. Dec 13 14:44:11.084678 sshd[7779]: pam_unix(sshd:session): session closed for user core Dec 13 14:44:11.086098 systemd[1]: sshd@31-147.28.180.89:22-139.178.89.65:35398.service: Deactivated successfully. Dec 13 14:44:11.086559 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 14:44:11.086984 systemd-logind[1555]: Session 29 logged out. Waiting for processes to exit. Dec 13 14:44:11.087431 systemd-logind[1555]: Removed session 29. Dec 13 14:44:10.999000 audit[7779]: CRED_ACQ pid=7779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.180180 kernel: audit: type=1101 audit(1734101050.997:1593): pid=7779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.180217 kernel: audit: type=1103 audit(1734101050.999:1594): pid=7779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.180233 kernel: audit: type=1006 audit(1734101050.999:1595): pid=7779 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 14:44:11.238649 kernel: audit: type=1300 audit(1734101050.999:1595): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffa9882e0 a2=3 a3=0 items=0 ppid=1 pid=7779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:10.999000 audit[7779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffa9882e0 a2=3 a3=0 items=0 ppid=1 pid=7779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:44:11.330500 kernel: audit: type=1327 audit(1734101050.999:1595): proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:10.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:44:11.360957 kernel: audit: type=1105 audit(1734101051.007:1596): pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.007000 audit[7779]: USER_START pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.008000 audit[7781]: CRED_ACQ pid=7781 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.544201 kernel: audit: type=1103 audit(1734101051.008:1597): pid=7781 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.544234 kernel: audit: type=1106 audit(1734101051.085:1598): pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.085000 audit[7779]: USER_END pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.639527 kernel: audit: type=1104 audit(1734101051.085:1599): pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.085000 audit[7779]: CRED_DISP pid=7779 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:44:11.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.28.180.89:22-139.178.89.65:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'