Dec 13 15:51:59.574287 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:51:59.574299 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:51:59.574306 kernel: BIOS-provided physical RAM map: Dec 13 15:51:59.574310 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 15:51:59.574314 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 15:51:59.574317 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 15:51:59.574322 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 15:51:59.574326 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 15:51:59.574330 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cafff] usable Dec 13 15:51:59.574333 kernel: BIOS-e820: [mem 0x00000000819cb000-0x00000000819cbfff] ACPI NVS Dec 13 15:51:59.574338 kernel: BIOS-e820: [mem 0x00000000819cc000-0x00000000819ccfff] reserved Dec 13 15:51:59.574342 kernel: BIOS-e820: [mem 0x00000000819cd000-0x000000008afccfff] usable Dec 13 15:51:59.574346 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 15:51:59.574350 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 15:51:59.574355 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 15:51:59.574360 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 15:51:59.574364 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 15:51:59.574368 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 15:51:59.574372 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 15:51:59.574377 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 15:51:59.574381 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 15:51:59.574385 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 15:51:59.574389 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 15:51:59.574393 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 15:51:59.574397 kernel: NX (Execute Disable) protection: active Dec 13 15:51:59.574402 kernel: SMBIOS 3.2.1 present. Dec 13 15:51:59.574406 kernel: DMI: Supermicro SYS-5019C-MR/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 15:51:59.574411 kernel: tsc: Detected 3400.000 MHz processor Dec 13 15:51:59.574415 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 15:51:59.574419 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:51:59.574424 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:51:59.574428 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 15:51:59.574433 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:51:59.574437 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 15:51:59.574441 kernel: Using GB pages for direct mapping Dec 13 15:51:59.574446 kernel: ACPI: Early table checksum verification disabled Dec 13 15:51:59.574451 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 15:51:59.574455 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 15:51:59.574459 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 15:51:59.574464 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 15:51:59.574470 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 15:51:59.574475 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 15:51:59.574480 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 15:51:59.574488 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 15:51:59.574493 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 15:51:59.574497 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 15:51:59.574502 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 15:51:59.574507 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 15:51:59.574526 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 15:51:59.574531 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:51:59.574536 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 15:51:59.574541 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 15:51:59.574545 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:51:59.574550 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:51:59.574554 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 15:51:59.574559 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 15:51:59.574563 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:51:59.574568 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:51:59.574573 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 15:51:59.574578 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 15:51:59.574582 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 15:51:59.574587 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 15:51:59.574592 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 15:51:59.574596 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 15:51:59.574601 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 15:51:59.574605 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 15:51:59.574610 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 15:51:59.574615 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 15:51:59.574620 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 15:51:59.574624 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 15:51:59.574629 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 15:51:59.574633 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 15:51:59.574638 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 15:51:59.574642 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 15:51:59.574647 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 15:51:59.574652 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 15:51:59.574657 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 15:51:59.574661 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 15:51:59.574666 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 15:51:59.574670 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 15:51:59.574675 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 15:51:59.574679 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 15:51:59.574684 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 15:51:59.574688 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 15:51:59.574694 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 15:51:59.574698 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 15:51:59.574703 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 15:51:59.574707 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 15:51:59.574712 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 15:51:59.574716 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 15:51:59.574721 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 15:51:59.574725 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 15:51:59.574730 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 15:51:59.574735 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 15:51:59.574740 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 15:51:59.574744 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 15:51:59.574749 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 15:51:59.574753 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 15:51:59.574758 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 15:51:59.574762 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 15:51:59.574767 kernel: No NUMA configuration found Dec 13 15:51:59.574772 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 15:51:59.574777 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 15:51:59.574781 kernel: Zone ranges: Dec 13 15:51:59.574786 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:51:59.574791 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 15:51:59.574795 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:51:59.574800 kernel: Movable zone start for each node Dec 13 15:51:59.574804 kernel: Early memory node ranges Dec 13 15:51:59.574809 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 15:51:59.574813 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 15:51:59.574818 kernel: node 0: [mem 0x0000000040400000-0x00000000819cafff] Dec 13 15:51:59.574823 kernel: node 0: [mem 0x00000000819cd000-0x000000008afccfff] Dec 13 15:51:59.574828 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 15:51:59.574832 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 15:51:59.574837 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:51:59.574841 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 15:51:59.574846 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:51:59.574854 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 15:51:59.574859 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 15:51:59.574864 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 15:51:59.574869 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 15:51:59.574875 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 15:51:59.574880 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 15:51:59.574884 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 15:51:59.574889 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 15:51:59.574894 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 15:51:59.574899 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 15:51:59.574904 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 15:51:59.574909 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 15:51:59.574914 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 15:51:59.574919 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 15:51:59.574924 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 15:51:59.574929 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 15:51:59.574934 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 15:51:59.574939 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 15:51:59.574943 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 15:51:59.574948 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 15:51:59.574954 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 15:51:59.574959 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 15:51:59.574963 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 15:51:59.574968 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 15:51:59.574973 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 15:51:59.574978 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:51:59.574983 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:51:59.574988 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:51:59.574993 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 15:51:59.574998 kernel: TSC deadline timer available Dec 13 15:51:59.575003 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 15:51:59.575008 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 15:51:59.575013 kernel: Booting paravirtualized kernel on bare hardware Dec 13 15:51:59.575018 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:51:59.575023 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:51:59.575028 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:51:59.575033 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:51:59.575037 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:51:59.575043 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 15:51:59.575048 kernel: Policy zone: Normal Dec 13 15:51:59.575053 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:51:59.575059 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:51:59.575063 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 15:51:59.575068 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 15:51:59.575073 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:51:59.575078 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 730116K reserved, 0K cma-reserved) Dec 13 15:51:59.575084 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:51:59.575089 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:51:59.575094 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:51:59.575099 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:51:59.575104 kernel: rcu: RCU event tracing is enabled. Dec 13 15:51:59.575109 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:51:59.575114 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:51:59.575119 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:51:59.575125 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:51:59.575130 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:51:59.575134 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 15:51:59.575139 kernel: random: crng init done Dec 13 15:51:59.575144 kernel: Console: colour dummy device 80x25 Dec 13 15:51:59.575149 kernel: printk: console [tty0] enabled Dec 13 15:51:59.575154 kernel: printk: console [ttyS1] enabled Dec 13 15:51:59.575159 kernel: ACPI: Core revision 20210730 Dec 13 15:51:59.575164 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 15:51:59.575168 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:51:59.575174 kernel: DMAR: Host address width 39 Dec 13 15:51:59.575179 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 15:51:59.575184 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 15:51:59.575189 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 15:51:59.575194 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 15:51:59.575198 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 15:51:59.575203 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 15:51:59.575208 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 15:51:59.575213 kernel: x2apic enabled Dec 13 15:51:59.575219 kernel: Switched APIC routing to cluster x2apic. Dec 13 15:51:59.575224 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 15:51:59.575229 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 15:51:59.575234 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 15:51:59.575238 kernel: process: using mwait in idle threads Dec 13 15:51:59.575243 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 15:51:59.575248 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 15:51:59.575253 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:51:59.575258 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 15:51:59.575263 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 15:51:59.575268 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 15:51:59.575273 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 15:51:59.575278 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:51:59.575283 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 15:51:59.575287 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 15:51:59.575292 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:51:59.575297 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:51:59.575302 kernel: TAA: Mitigation: TSX disabled Dec 13 15:51:59.575307 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 15:51:59.575312 kernel: SRBDS: Mitigation: Microcode Dec 13 15:51:59.575317 kernel: GDS: Vulnerable: No microcode Dec 13 15:51:59.575322 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:51:59.575327 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:51:59.575332 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:51:59.575336 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 15:51:59.575341 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 15:51:59.575346 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:51:59.575351 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 15:51:59.575356 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 15:51:59.575360 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 15:51:59.575365 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:51:59.575371 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:51:59.575375 kernel: LSM: Security Framework initializing Dec 13 15:51:59.575380 kernel: SELinux: Initializing. Dec 13 15:51:59.575385 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:51:59.575390 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:51:59.575395 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 15:51:59.575400 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 15:51:59.575404 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 15:51:59.575409 kernel: ... version: 4 Dec 13 15:51:59.575414 kernel: ... bit width: 48 Dec 13 15:51:59.575419 kernel: ... generic registers: 4 Dec 13 15:51:59.575425 kernel: ... value mask: 0000ffffffffffff Dec 13 15:51:59.575430 kernel: ... max period: 00007fffffffffff Dec 13 15:51:59.575435 kernel: ... fixed-purpose events: 3 Dec 13 15:51:59.575440 kernel: ... event mask: 000000070000000f Dec 13 15:51:59.575444 kernel: signal: max sigframe size: 2032 Dec 13 15:51:59.575449 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:51:59.575454 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 15:51:59.575459 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:51:59.575464 kernel: x86: Booting SMP configuration: Dec 13 15:51:59.575470 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 15:51:59.575475 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 15:51:59.575480 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 15:51:59.575485 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 15:51:59.575510 kernel: smpboot: Max logical packages: 1 Dec 13 15:51:59.575515 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 15:51:59.575520 kernel: devtmpfs: initialized Dec 13 15:51:59.575525 kernel: x86/mm: Memory block size: 128MB Dec 13 15:51:59.575544 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819cb000-0x819cbfff] (4096 bytes) Dec 13 15:51:59.575549 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 15:51:59.575554 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:51:59.575559 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:51:59.575564 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:51:59.575569 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:51:59.575574 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:51:59.575579 kernel: audit: type=2000 audit(1734105114.041:1): state=initialized audit_enabled=0 res=1 Dec 13 15:51:59.575583 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:51:59.575588 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:51:59.575594 kernel: cpuidle: using governor menu Dec 13 15:51:59.575599 kernel: ACPI: bus type PCI registered Dec 13 15:51:59.575604 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:51:59.575609 kernel: dca service started, version 1.12.1 Dec 13 15:51:59.575613 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 15:51:59.575618 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 15:51:59.575623 kernel: PCI: Using configuration type 1 for base access Dec 13 15:51:59.575628 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 15:51:59.575633 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:51:59.575638 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:51:59.575643 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:51:59.575648 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:51:59.575653 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:51:59.575658 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:51:59.575663 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:51:59.575668 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:51:59.575673 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:51:59.575677 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:51:59.575683 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 15:51:59.575688 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575693 kernel: ACPI: SSDT 0xFFFF8E7D80219500 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 15:51:59.575698 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 15:51:59.575703 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575708 kernel: ACPI: SSDT 0xFFFF8E7D81AE6800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 15:51:59.575712 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575717 kernel: ACPI: SSDT 0xFFFF8E7D81A59000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 15:51:59.575722 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575728 kernel: ACPI: SSDT 0xFFFF8E7D81B4F800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 15:51:59.575732 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575737 kernel: ACPI: SSDT 0xFFFF8E7D8014D000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 15:51:59.575742 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:51:59.575747 kernel: ACPI: SSDT 0xFFFF8E7D81AE3C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 15:51:59.575752 kernel: ACPI: Interpreter enabled Dec 13 15:51:59.575757 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:51:59.575762 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:51:59.575766 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 15:51:59.575772 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 15:51:59.575777 kernel: HEST: Table parsing has been initialized. Dec 13 15:51:59.575782 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 15:51:59.575787 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:51:59.575792 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 15:51:59.575796 kernel: ACPI: PM: Power Resource [USBC] Dec 13 15:51:59.575801 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 15:51:59.575806 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 15:51:59.575811 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 15:51:59.575816 kernel: ACPI: PM: Power Resource [WRST] Dec 13 15:51:59.575821 kernel: ACPI: PM: Power Resource [FN00] Dec 13 15:51:59.575826 kernel: ACPI: PM: Power Resource [FN01] Dec 13 15:51:59.575831 kernel: ACPI: PM: Power Resource [FN02] Dec 13 15:51:59.575836 kernel: ACPI: PM: Power Resource [FN03] Dec 13 15:51:59.575841 kernel: ACPI: PM: Power Resource [FN04] Dec 13 15:51:59.575845 kernel: ACPI: PM: Power Resource [PIN] Dec 13 15:51:59.575850 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 15:51:59.575916 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:51:59.575963 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 15:51:59.576004 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 15:51:59.576011 kernel: PCI host bridge to bus 0000:00 Dec 13 15:51:59.576055 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:51:59.576092 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:51:59.576129 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:51:59.576166 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 15:51:59.576205 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 15:51:59.576240 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 15:51:59.576290 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 15:51:59.576340 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 15:51:59.576383 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.576429 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 15:51:59.576473 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 15:51:59.576538 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 15:51:59.576581 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 15:51:59.576627 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 15:51:59.576671 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 15:51:59.576715 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 15:51:59.576765 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 15:51:59.576807 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 15:51:59.576850 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 15:51:59.576896 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 15:51:59.576939 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:51:59.576987 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 15:51:59.577031 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:51:59.577076 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 15:51:59.577118 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 15:51:59.577160 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 15:51:59.577204 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 15:51:59.577247 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 15:51:59.577288 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 15:51:59.577334 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 15:51:59.577376 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 15:51:59.577416 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 15:51:59.577461 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 15:51:59.577505 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 15:51:59.577549 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 15:51:59.577595 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 15:51:59.577639 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 15:51:59.577682 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 15:51:59.577724 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 15:51:59.577766 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 15:51:59.577813 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 15:51:59.577858 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.577904 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 15:51:59.577949 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.577997 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 15:51:59.578040 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.578086 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 15:51:59.578129 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.578178 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 15:51:59.578221 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.578269 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 15:51:59.578311 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:51:59.578360 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 15:51:59.578406 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 15:51:59.578448 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 15:51:59.578493 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 15:51:59.578542 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 15:51:59.578585 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 15:51:59.578636 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 15:51:59.578681 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 15:51:59.578724 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 15:51:59.578768 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 15:51:59.578811 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:51:59.578855 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:51:59.578902 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 15:51:59.578947 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 15:51:59.578992 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 15:51:59.579035 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 15:51:59.579079 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:51:59.579122 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:51:59.579166 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:51:59.579208 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:51:59.579253 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:51:59.579296 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:51:59.579345 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 15:51:59.579389 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:51:59.579433 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 15:51:59.579478 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 15:51:59.579524 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 15:51:59.579569 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.579614 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:51:59.579657 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:51:59.579699 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:51:59.579767 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 15:51:59.579811 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:51:59.579854 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 15:51:59.579897 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 15:51:59.579941 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 15:51:59.579984 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:51:59.580026 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:51:59.580068 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:51:59.580109 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:51:59.580152 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:51:59.580199 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 15:51:59.580277 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 15:51:59.580344 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 15:51:59.580388 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:51:59.580429 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:51:59.580472 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:51:59.580554 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:51:59.580602 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 15:51:59.580654 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 15:51:59.580702 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 15:51:59.580748 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 15:51:59.580793 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 15:51:59.580839 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:51:59.580884 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 15:51:59.580932 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:51:59.580975 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:51:59.581020 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:51:59.581064 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:51:59.581072 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 15:51:59.581077 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 15:51:59.581083 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 15:51:59.581088 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 15:51:59.581093 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 15:51:59.581098 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 15:51:59.581104 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 15:51:59.581110 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 15:51:59.581115 kernel: iommu: Default domain type: Translated Dec 13 15:51:59.581120 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:51:59.581165 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 15:51:59.581210 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:51:59.581256 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 15:51:59.581265 kernel: vgaarb: loaded Dec 13 15:51:59.581270 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:51:59.581276 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:51:59.581282 kernel: PTP clock support registered Dec 13 15:51:59.581287 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:51:59.581292 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:51:59.581297 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 15:51:59.581302 kernel: e820: reserve RAM buffer [mem 0x819cb000-0x83ffffff] Dec 13 15:51:59.581307 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 15:51:59.581312 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 15:51:59.581317 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 15:51:59.581323 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 15:51:59.581328 kernel: clocksource: Switched to clocksource tsc-early Dec 13 15:51:59.581334 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:51:59.581339 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:51:59.581344 kernel: pnp: PnP ACPI init Dec 13 15:51:59.581387 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 15:51:59.581431 kernel: pnp 00:02: [dma 0 disabled] Dec 13 15:51:59.581471 kernel: pnp 00:03: [dma 0 disabled] Dec 13 15:51:59.581554 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 15:51:59.581592 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 15:51:59.581633 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 15:51:59.581674 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 15:51:59.581712 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 15:51:59.581749 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 15:51:59.581787 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 15:51:59.581825 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 15:51:59.581861 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 15:51:59.581899 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 15:51:59.581936 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 15:51:59.581976 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 15:51:59.582015 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 15:51:59.582053 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 15:51:59.582090 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 15:51:59.582127 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 15:51:59.582165 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 15:51:59.582202 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 15:51:59.582242 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 15:51:59.582249 kernel: pnp: PnP ACPI: found 10 devices Dec 13 15:51:59.582256 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:51:59.582261 kernel: NET: Registered PF_INET protocol family Dec 13 15:51:59.582267 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:51:59.582272 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:51:59.582277 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:51:59.582282 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:51:59.582288 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 15:51:59.582293 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 15:51:59.582298 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:51:59.582304 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:51:59.582310 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:51:59.582315 kernel: NET: Registered PF_XDP protocol family Dec 13 15:51:59.582358 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 15:51:59.582399 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 15:51:59.582442 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 15:51:59.582488 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:51:59.582571 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:51:59.582616 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:51:59.582660 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:51:59.582704 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:51:59.582747 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:51:59.582789 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:51:59.582831 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:51:59.582876 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:51:59.582918 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:51:59.582960 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:51:59.583001 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:51:59.583043 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:51:59.583084 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:51:59.583125 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:51:59.583171 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:51:59.583214 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:51:59.583258 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:51:59.583299 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:51:59.583343 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:51:59.583384 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:51:59.583423 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 15:51:59.583460 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:51:59.583521 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:51:59.583560 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:51:59.583597 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 15:51:59.583635 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 15:51:59.583678 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 15:51:59.583718 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:51:59.583764 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 15:51:59.583805 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 15:51:59.583849 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 15:51:59.583888 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 15:51:59.583932 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 15:51:59.583971 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:51:59.584013 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 15:51:59.584054 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:51:59.584063 kernel: PCI: CLS 64 bytes, default 64 Dec 13 15:51:59.584069 kernel: DMAR: No ATSR found Dec 13 15:51:59.584074 kernel: DMAR: No SATC found Dec 13 15:51:59.584079 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 15:51:59.584121 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 15:51:59.584166 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 15:51:59.584208 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 15:51:59.584251 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 15:51:59.584295 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 15:51:59.584339 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 15:51:59.584381 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 15:51:59.584423 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 15:51:59.584465 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 15:51:59.584509 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 15:51:59.584552 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 15:51:59.584594 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 15:51:59.584637 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 15:51:59.584681 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 15:51:59.584743 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 15:51:59.584785 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 15:51:59.584825 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 15:51:59.584867 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 15:51:59.584908 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 15:51:59.584950 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 15:51:59.584991 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 15:51:59.585036 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 15:51:59.585079 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 15:51:59.585123 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 15:51:59.585166 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 15:51:59.585210 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 15:51:59.585255 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 15:51:59.585263 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 15:51:59.585269 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:51:59.585275 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 15:51:59.585280 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 15:51:59.585286 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 15:51:59.585291 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 15:51:59.585296 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 15:51:59.585341 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 15:51:59.585350 kernel: Initialise system trusted keyrings Dec 13 15:51:59.585355 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 15:51:59.585362 kernel: Key type asymmetric registered Dec 13 15:51:59.585367 kernel: Asymmetric key parser 'x509' registered Dec 13 15:51:59.585372 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:51:59.585377 kernel: io scheduler mq-deadline registered Dec 13 15:51:59.585382 kernel: io scheduler kyber registered Dec 13 15:51:59.585388 kernel: io scheduler bfq registered Dec 13 15:51:59.585430 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 15:51:59.585473 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 15:51:59.585560 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 15:51:59.585603 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 15:51:59.585646 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 15:51:59.585688 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 15:51:59.585734 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 15:51:59.585742 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 15:51:59.585748 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 15:51:59.585753 kernel: pstore: Registered erst as persistent store backend Dec 13 15:51:59.585760 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:51:59.585765 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:51:59.585770 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:51:59.585776 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 15:51:59.585781 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 15:51:59.585825 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 15:51:59.585833 kernel: i8042: PNP: No PS/2 controller found. Dec 13 15:51:59.585871 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 15:51:59.585913 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 15:51:59.585952 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T15:51:58 UTC (1734105118) Dec 13 15:51:59.585990 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 15:51:59.585998 kernel: fail to initialize ptp_kvm Dec 13 15:51:59.586003 kernel: intel_pstate: Intel P-state driver initializing Dec 13 15:51:59.586008 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 15:51:59.586014 kernel: intel_pstate: HWP enabled Dec 13 15:51:59.586019 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 15:51:59.586024 kernel: vesafb: scrolling: redraw Dec 13 15:51:59.586031 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 15:51:59.586036 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000ec22d48b, using 768k, total 768k Dec 13 15:51:59.586041 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 15:51:59.586047 kernel: fb0: VESA VGA frame buffer device Dec 13 15:51:59.586052 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:51:59.586057 kernel: Segment Routing with IPv6 Dec 13 15:51:59.586062 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:51:59.586068 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:51:59.586073 kernel: Key type dns_resolver registered Dec 13 15:51:59.586079 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 15:51:59.586084 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 15:51:59.586089 kernel: IPI shorthand broadcast: enabled Dec 13 15:51:59.586095 kernel: sched_clock: Marking stable (1737008518, 1339412983)->(4519517853, -1443096352) Dec 13 15:51:59.586100 kernel: registered taskstats version 1 Dec 13 15:51:59.586105 kernel: Loading compiled-in X.509 certificates Dec 13 15:51:59.586110 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:51:59.586115 kernel: Key type .fscrypt registered Dec 13 15:51:59.586120 kernel: Key type fscrypt-provisioning registered Dec 13 15:51:59.586126 kernel: pstore: Using crash dump compression: deflate Dec 13 15:51:59.586132 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:51:59.586137 kernel: ima: No architecture policies found Dec 13 15:51:59.586142 kernel: clk: Disabling unused clocks Dec 13 15:51:59.586147 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:51:59.586153 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:51:59.586158 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:51:59.586163 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:51:59.586168 kernel: Run /init as init process Dec 13 15:51:59.586174 kernel: with arguments: Dec 13 15:51:59.586180 kernel: /init Dec 13 15:51:59.586185 kernel: with environment: Dec 13 15:51:59.586190 kernel: HOME=/ Dec 13 15:51:59.586195 kernel: TERM=linux Dec 13 15:51:59.586200 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:51:59.586206 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:51:59.586213 systemd[1]: Detected architecture x86-64. Dec 13 15:51:59.586219 systemd[1]: Running in initrd. Dec 13 15:51:59.586225 systemd[1]: No hostname configured, using default hostname. Dec 13 15:51:59.586230 systemd[1]: Hostname set to . Dec 13 15:51:59.586235 systemd[1]: Initializing machine ID from random generator. Dec 13 15:51:59.586241 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:51:59.586246 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:51:59.586252 systemd[1]: Reached target cryptsetup.target. Dec 13 15:51:59.586257 systemd[1]: Reached target paths.target. Dec 13 15:51:59.586263 systemd[1]: Reached target slices.target. Dec 13 15:51:59.586268 systemd[1]: Reached target swap.target. Dec 13 15:51:59.586274 systemd[1]: Reached target timers.target. Dec 13 15:51:59.586279 systemd[1]: Listening on iscsid.socket. Dec 13 15:51:59.586285 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:51:59.586290 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:51:59.586296 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:51:59.586302 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:51:59.586307 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Dec 13 15:51:59.586312 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Dec 13 15:51:59.586318 kernel: clocksource: Switched to clocksource tsc Dec 13 15:51:59.586323 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:51:59.586329 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:51:59.586334 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:51:59.586339 systemd[1]: Reached target sockets.target. Dec 13 15:51:59.586345 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:51:59.586351 systemd[1]: Finished network-cleanup.service. Dec 13 15:51:59.586357 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:51:59.586362 systemd[1]: Starting systemd-journald.service... Dec 13 15:51:59.586367 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:51:59.586375 systemd-journald[268]: Journal started Dec 13 15:51:59.586401 systemd-journald[268]: Runtime Journal (/run/log/journal/b1f55ddc8d3140ada1945204d619dd08) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:51:59.588671 systemd-modules-load[269]: Inserted module 'overlay' Dec 13 15:51:59.593000 audit: BPF prog-id=6 op=LOAD Dec 13 15:51:59.612526 kernel: audit: type=1334 audit(1734105119.593:2): prog-id=6 op=LOAD Dec 13 15:51:59.612543 systemd[1]: Starting systemd-resolved.service... Dec 13 15:51:59.661534 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:51:59.661564 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:51:59.694491 kernel: Bridge firewalling registered Dec 13 15:51:59.694506 systemd[1]: Started systemd-journald.service. Dec 13 15:51:59.709137 systemd-modules-load[269]: Inserted module 'br_netfilter' Dec 13 15:51:59.758788 kernel: audit: type=1130 audit(1734105119.716:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.711826 systemd-resolved[271]: Positive Trust Anchors: Dec 13 15:51:59.815291 kernel: SCSI subsystem initialized Dec 13 15:51:59.815302 kernel: audit: type=1130 audit(1734105119.769:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.711832 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:51:59.936562 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:51:59.936574 kernel: audit: type=1130 audit(1734105119.840:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.936582 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:51:59.936588 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:51:59.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.711851 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:52:00.010724 kernel: audit: type=1130 audit(1734105119.945:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.713357 systemd-resolved[271]: Defaulting to hostname 'linux'. Dec 13 15:52:00.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.717760 systemd[1]: Started systemd-resolved.service. Dec 13 15:52:00.120690 kernel: audit: type=1130 audit(1734105120.019:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.120701 kernel: audit: type=1130 audit(1734105120.074:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:59.770657 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:51:59.841647 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:51:59.939327 systemd-modules-load[269]: Inserted module 'dm_multipath' Dec 13 15:51:59.945777 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:52:00.019859 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:52:00.074772 systemd[1]: Reached target nss-lookup.target. Dec 13 15:52:00.130092 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:52:00.150069 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:52:00.150363 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:52:00.153158 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:52:00.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.153992 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:52:00.202564 kernel: audit: type=1130 audit(1734105120.151:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.214815 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:52:00.280601 kernel: audit: type=1130 audit(1734105120.214:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.273128 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:52:00.294607 dracut-cmdline[292]: dracut-dracut-053 Dec 13 15:52:00.294607 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 15:52:00.294607 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:52:00.366531 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:52:00.366545 kernel: iscsi: registered transport (tcp) Dec 13 15:52:00.421585 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:52:00.421602 kernel: QLogic iSCSI HBA Driver Dec 13 15:52:00.437850 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:52:00.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:00.447282 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:52:00.502552 kernel: raid6: avx2x4 gen() 48046 MB/s Dec 13 15:52:00.537552 kernel: raid6: avx2x4 xor() 14785 MB/s Dec 13 15:52:00.572553 kernel: raid6: avx2x2 gen() 51892 MB/s Dec 13 15:52:00.607553 kernel: raid6: avx2x2 xor() 32134 MB/s Dec 13 15:52:00.642520 kernel: raid6: avx2x1 gen() 44507 MB/s Dec 13 15:52:00.676547 kernel: raid6: avx2x1 xor() 27832 MB/s Dec 13 15:52:00.710523 kernel: raid6: sse2x4 gen() 21382 MB/s Dec 13 15:52:00.744519 kernel: raid6: sse2x4 xor() 11946 MB/s Dec 13 15:52:00.778556 kernel: raid6: sse2x2 gen() 21647 MB/s Dec 13 15:52:00.812557 kernel: raid6: sse2x2 xor() 13415 MB/s Dec 13 15:52:00.846519 kernel: raid6: sse2x1 gen() 17881 MB/s Dec 13 15:52:00.899431 kernel: raid6: sse2x1 xor() 8736 MB/s Dec 13 15:52:00.899446 kernel: raid6: using algorithm avx2x2 gen() 51892 MB/s Dec 13 15:52:00.899453 kernel: raid6: .... xor() 32134 MB/s, rmw enabled Dec 13 15:52:00.917791 kernel: raid6: using avx2x2 recovery algorithm Dec 13 15:52:00.964492 kernel: xor: automatically using best checksumming function avx Dec 13 15:52:01.043497 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:52:01.048257 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:52:01.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:01.057000 audit: BPF prog-id=7 op=LOAD Dec 13 15:52:01.057000 audit: BPF prog-id=8 op=LOAD Dec 13 15:52:01.058522 systemd[1]: Starting systemd-udevd.service... Dec 13 15:52:01.066103 systemd-udevd[472]: Using default interface naming scheme 'v252'. Dec 13 15:52:01.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:01.072774 systemd[1]: Started systemd-udevd.service. Dec 13 15:52:01.113618 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Dec 13 15:52:01.089126 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:52:01.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:01.119055 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:52:01.131742 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:52:01.184276 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:52:01.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:01.210498 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:52:01.251455 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 15:52:01.251542 kernel: AES CTR mode by8 optimization enabled Dec 13 15:52:01.268527 kernel: ACPI: bus type USB registered Dec 13 15:52:01.268555 kernel: libata version 3.00 loaded. Dec 13 15:52:01.268563 kernel: usbcore: registered new interface driver usbfs Dec 13 15:52:01.286394 kernel: usbcore: registered new interface driver hub Dec 13 15:52:01.304545 kernel: usbcore: registered new device driver usb Dec 13 15:52:01.356953 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 15:52:01.356981 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 15:52:01.378562 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Dec 13 15:52:02.008853 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:52:02.008921 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:52:02.008974 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 15:52:02.009026 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 15:52:02.009074 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 15:52:02.009120 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 15:52:02.009167 kernel: scsi host0: ahci Dec 13 15:52:02.009226 kernel: pps pps0: new PPS source ptp0 Dec 13 15:52:02.009284 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 15:52:02.009338 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:52:02.009387 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:7c Dec 13 15:52:02.009435 kernel: scsi host1: ahci Dec 13 15:52:02.009493 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 15:52:02.009546 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:52:02.009595 kernel: scsi host2: ahci Dec 13 15:52:02.009648 kernel: scsi host3: ahci Dec 13 15:52:02.009703 kernel: scsi host4: ahci Dec 13 15:52:02.009754 kernel: scsi host5: ahci Dec 13 15:52:02.009805 kernel: scsi host6: ahci Dec 13 15:52:02.009857 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Dec 13 15:52:02.009864 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Dec 13 15:52:02.009871 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Dec 13 15:52:02.009877 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Dec 13 15:52:02.009883 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Dec 13 15:52:02.009889 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Dec 13 15:52:02.009896 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Dec 13 15:52:02.009902 kernel: pps pps1: new PPS source ptp1 Dec 13 15:52:02.009951 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 15:52:02.010000 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 15:52:02.010052 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:52:02.010098 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:52:02.010147 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 15:52:02.010191 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 15:52:02.010237 kernel: hub 1-0:1.0: USB hub found Dec 13 15:52:02.010298 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:7d Dec 13 15:52:02.010348 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 15:52:02.010396 kernel: hub 1-0:1.0: 16 ports detected Dec 13 15:52:02.010446 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:52:02.010497 kernel: hub 2-0:1.0: USB hub found Dec 13 15:52:02.010602 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Dec 13 15:52:02.010651 kernel: hub 2-0:1.0: 10 ports detected Dec 13 15:52:02.010702 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 15:52:02.010709 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:52:02.010758 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:52:02.010765 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 15:52:02.010779 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:52:02.010786 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:52:02.010833 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Dec 13 15:52:02.010841 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Dec 13 15:52:03.056797 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:52:03.056812 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:52:03.056875 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:52:03.056884 kernel: hub 1-14:1.0: USB hub found Dec 13 15:52:03.056947 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:52:03.056955 kernel: hub 1-14:1.0: 4 ports detected Dec 13 15:52:03.057009 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Dec 13 15:52:03.057017 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:52:03.057024 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:52:03.057032 kernel: ata1.00: Features: NCQ-prio Dec 13 15:52:03.057039 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:52:03.057045 kernel: ata2.00: Features: NCQ-prio Dec 13 15:52:03.057052 kernel: ata1.00: configured for UDMA/133 Dec 13 15:52:03.057058 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Dec 13 15:52:03.057119 kernel: ata2.00: configured for UDMA/133 Dec 13 15:52:03.057126 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Dec 13 15:52:03.057184 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 15:52:03.057239 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:03.057247 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:52:03.057253 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Dec 13 15:52:03.057303 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:52:03.057357 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:52:03.057430 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 15:52:03.057484 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 15:52:03.057558 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 15:52:03.057613 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:52:03.057666 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:03.057674 kernel: port_module: 9 callbacks suppressed Dec 13 15:52:03.057681 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 15:52:03.057730 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 15:52:03.057783 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 15:52:03.057875 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 15:52:03.057933 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 15:52:03.057986 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 15:52:03.058039 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:52:03.058092 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:52:03.058099 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:52:03.058106 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:52:03.058113 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:52:03.058119 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 15:52:03.058173 kernel: GPT:9289727 != 937703087 Dec 13 15:52:03.058180 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:52:03.058187 kernel: GPT:9289727 != 937703087 Dec 13 15:52:03.058193 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:52:03.058200 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:52:03.058206 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:03.058212 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 15:52:03.058265 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:52:03.058316 kernel: usbcore: registered new interface driver usbhid Dec 13 15:52:03.058325 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (542) Dec 13 15:52:03.058332 kernel: usbhid: USB HID core driver Dec 13 15:52:03.058338 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 15:52:03.058345 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 15:52:03.058409 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:03.058417 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 15:52:03.058423 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:52:03.058430 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 15:52:03.089034 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:52:03.089087 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:02.829635 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:52:03.162584 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:52:03.162595 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:02.889613 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:52:03.183584 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:52:02.915395 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:52:03.200590 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 15:52:03.200665 disk-uuid[676]: Primary Header is updated. Dec 13 15:52:03.200665 disk-uuid[676]: Secondary Entries is updated. Dec 13 15:52:03.200665 disk-uuid[676]: Secondary Header is updated. Dec 13 15:52:03.240529 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 15:52:02.930591 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:52:02.946564 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:52:02.955120 systemd[1]: Starting disk-uuid.service... Dec 13 15:52:04.165170 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:52:04.184370 disk-uuid[677]: The operation has completed successfully. Dec 13 15:52:04.192614 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:52:04.220218 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:52:04.319160 kernel: audit: type=1130 audit(1734105124.228:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.319178 kernel: audit: type=1131 audit(1734105124.228:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.220262 systemd[1]: Finished disk-uuid.service. Dec 13 15:52:04.348579 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 15:52:04.231908 systemd[1]: Starting verity-setup.service... Dec 13 15:52:04.383489 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:52:04.393631 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:52:04.407825 systemd[1]: Finished verity-setup.service. Dec 13 15:52:04.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.470491 kernel: audit: type=1130 audit(1734105124.422:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.499941 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:52:04.513590 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:52:04.506792 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:52:04.596694 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:52:04.596709 kernel: BTRFS info (device sda6): using free space tree Dec 13 15:52:04.596716 kernel: BTRFS info (device sda6): has skinny extents Dec 13 15:52:04.596723 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 15:52:04.507209 systemd[1]: Starting ignition-setup.service... Dec 13 15:52:04.530398 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:52:04.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.604935 systemd[1]: Finished ignition-setup.service. Dec 13 15:52:04.724920 kernel: audit: type=1130 audit(1734105124.619:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.725011 kernel: audit: type=1130 audit(1734105124.675:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.619830 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:52:04.755555 kernel: audit: type=1334 audit(1734105124.731:24): prog-id=9 op=LOAD Dec 13 15:52:04.731000 audit: BPF prog-id=9 op=LOAD Dec 13 15:52:04.676149 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:52:04.733350 systemd[1]: Starting systemd-networkd.service... Dec 13 15:52:04.769410 systemd-networkd[877]: lo: Link UP Dec 13 15:52:04.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.793188 ignition[865]: Ignition 2.14.0 Dec 13 15:52:04.852736 kernel: audit: type=1130 audit(1734105124.784:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.769412 systemd-networkd[877]: lo: Gained carrier Dec 13 15:52:04.793192 ignition[865]: Stage: fetch-offline Dec 13 15:52:04.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.769710 systemd-networkd[877]: Enumeration completed Dec 13 15:52:05.008590 kernel: audit: type=1130 audit(1734105124.873:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:05.008612 kernel: audit: type=1130 audit(1734105124.933:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:05.008639 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:52:04.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.793219 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:05.043667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 15:52:04.769783 systemd[1]: Started systemd-networkd.service. Dec 13 15:52:04.793232 ignition[865]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:04.770394 systemd-networkd[877]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:52:05.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.795845 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:04.785642 systemd[1]: Reached target network.target. Dec 13 15:52:05.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:05.109625 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:52:05.109625 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 15:52:05.109625 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:52:05.109625 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:52:05.109625 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:52:05.109625 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:52:05.109625 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:52:05.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:04.795910 ignition[865]: parsed url from cmdline: "" Dec 13 15:52:04.806062 unknown[865]: fetched base config from "system" Dec 13 15:52:05.273598 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:52:04.795912 ignition[865]: no config URL provided Dec 13 15:52:04.806066 unknown[865]: fetched user config from "system" Dec 13 15:52:04.795915 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:52:04.846083 systemd[1]: Starting iscsiuio.service... Dec 13 15:52:04.795935 ignition[865]: parsing config with SHA512: b2e2ab80d949bb0d4f67d7df204e340700ea913d25406c7aec7585c30fbdd4f0ccc2b8223769ab0569f82687441bcb1d5fbc3449ed61283d4b55e77be977e937 Dec 13 15:52:04.859762 systemd[1]: Started iscsiuio.service. Dec 13 15:52:04.806354 ignition[865]: fetch-offline: fetch-offline passed Dec 13 15:52:04.873784 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:52:04.806356 ignition[865]: POST message to Packet Timeline Dec 13 15:52:04.933726 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 15:52:04.806361 ignition[865]: POST Status error: resource requires networking Dec 13 15:52:04.934195 systemd[1]: Starting ignition-kargs.service... Dec 13 15:52:04.806396 ignition[865]: Ignition finished successfully Dec 13 15:52:05.009545 systemd-networkd[877]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:52:05.013172 ignition[888]: Ignition 2.14.0 Dec 13 15:52:05.023104 systemd[1]: Starting iscsid.service... Dec 13 15:52:05.013175 ignition[888]: Stage: kargs Dec 13 15:52:05.051880 systemd[1]: Started iscsid.service. Dec 13 15:52:05.013232 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:05.066040 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:52:05.013242 ignition[888]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:05.084781 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:52:05.014616 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:05.102679 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:52:05.016351 ignition[888]: kargs: kargs passed Dec 13 15:52:05.117648 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:52:05.016354 ignition[888]: POST message to Packet Timeline Dec 13 15:52:05.117758 systemd[1]: Reached target remote-fs.target. Dec 13 15:52:05.016367 ignition[888]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:52:05.170857 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:52:05.019607 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49686->[::1]:53: read: connection refused Dec 13 15:52:05.202865 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:52:05.220137 ignition[888]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 15:52:05.267317 systemd-networkd[877]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:52:05.220482 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43536->[::1]:53: read: connection refused Dec 13 15:52:05.295842 systemd-networkd[877]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:52:05.326601 systemd-networkd[877]: enp1s0f1np1: Link UP Dec 13 15:52:05.326893 systemd-networkd[877]: enp1s0f1np1: Gained carrier Dec 13 15:52:05.334854 systemd-networkd[877]: enp1s0f0np0: Link UP Dec 13 15:52:05.335222 systemd-networkd[877]: eno2: Link UP Dec 13 15:52:05.335584 systemd-networkd[877]: eno1: Link UP Dec 13 15:52:05.621185 ignition[888]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 15:52:05.622606 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33583->[::1]:53: read: connection refused Dec 13 15:52:06.054416 systemd-networkd[877]: enp1s0f0np0: Gained carrier Dec 13 15:52:06.062752 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 15:52:06.080769 systemd-networkd[877]: enp1s0f0np0: DHCPv4 address 147.75.203.63/31, gateway 147.75.203.62 acquired from 145.40.83.140 Dec 13 15:52:06.423101 ignition[888]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 15:52:06.424379 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53643->[::1]:53: read: connection refused Dec 13 15:52:07.119150 systemd-networkd[877]: enp1s0f1np1: Gained IPv6LL Dec 13 15:52:07.374966 systemd-networkd[877]: enp1s0f0np0: Gained IPv6LL Dec 13 15:52:08.025643 ignition[888]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 15:52:08.026927 ignition[888]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39411->[::1]:53: read: connection refused Dec 13 15:52:11.230520 ignition[888]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 15:52:11.958650 ignition[888]: GET result: OK Dec 13 15:52:12.375860 ignition[888]: Ignition finished successfully Dec 13 15:52:12.380250 systemd[1]: Finished ignition-kargs.service. Dec 13 15:52:12.469917 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 15:52:12.469933 kernel: audit: type=1130 audit(1734105132.392:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:12.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:12.401167 ignition[917]: Ignition 2.14.0 Dec 13 15:52:12.394893 systemd[1]: Starting ignition-disks.service... Dec 13 15:52:12.401170 ignition[917]: Stage: disks Dec 13 15:52:12.401224 ignition[917]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:12.401233 ignition[917]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:12.402799 ignition[917]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:12.404496 ignition[917]: disks: disks passed Dec 13 15:52:12.404499 ignition[917]: POST message to Packet Timeline Dec 13 15:52:12.404512 ignition[917]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:52:12.984240 ignition[917]: GET result: OK Dec 13 15:52:13.310525 ignition[917]: Ignition finished successfully Dec 13 15:52:13.313471 systemd[1]: Finished ignition-disks.service. Dec 13 15:52:13.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.326266 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:52:13.403701 kernel: audit: type=1130 audit(1734105133.325:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.389733 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:52:13.389769 systemd[1]: Reached target local-fs.target. Dec 13 15:52:13.412682 systemd[1]: Reached target sysinit.target. Dec 13 15:52:13.412717 systemd[1]: Reached target basic.target. Dec 13 15:52:13.434338 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:52:13.453334 systemd-fsck[932]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 15:52:13.472875 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:52:13.562692 kernel: audit: type=1130 audit(1734105133.481:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.562707 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:52:13.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.482118 systemd[1]: Mounting sysroot.mount... Dec 13 15:52:13.570118 systemd[1]: Mounted sysroot.mount. Dec 13 15:52:13.583755 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:52:13.591436 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:52:13.612481 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 15:52:13.627065 systemd[1]: Starting flatcar-static-network.service... Dec 13 15:52:13.642571 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:52:13.642608 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:52:13.661158 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:52:13.685914 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:52:13.798693 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (945) Dec 13 15:52:13.798712 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:52:13.798719 kernel: BTRFS info (device sda6): using free space tree Dec 13 15:52:13.798727 kernel: BTRFS info (device sda6): has skinny extents Dec 13 15:52:13.798785 coreos-metadata[940]: Dec 13 15:52:13.740 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:52:13.888760 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 15:52:13.888782 kernel: audit: type=1130 audit(1734105133.817:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.698226 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:52:13.904550 coreos-metadata[939]: Dec 13 15:52:13.741 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:52:13.743316 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:52:13.939596 initrd-setup-root[950]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:52:13.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:13.819047 systemd[1]: Starting ignition-mount.service... Dec 13 15:52:14.010714 kernel: audit: type=1130 audit(1734105133.947:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.010729 initrd-setup-root[958]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:52:14.020684 bash[1010]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:52:13.896264 systemd[1]: Starting sysroot-boot.service... Dec 13 15:52:14.036676 initrd-setup-root[966]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:52:14.046732 ignition[1016]: INFO : Ignition 2.14.0 Dec 13 15:52:14.046732 ignition[1016]: INFO : Stage: mount Dec 13 15:52:14.046732 ignition[1016]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:14.046732 ignition[1016]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:14.046732 ignition[1016]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:14.046732 ignition[1016]: INFO : mount: mount passed Dec 13 15:52:14.046732 ignition[1016]: INFO : POST message to Packet Timeline Dec 13 15:52:14.046732 ignition[1016]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:52:13.914603 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:52:14.139863 initrd-setup-root[974]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:52:13.933192 systemd[1]: Finished sysroot-boot.service. Dec 13 15:52:14.433811 ignition[1016]: INFO : GET result: OK Dec 13 15:52:14.461396 coreos-metadata[940]: Dec 13 15:52:14.461 INFO Fetch successful Dec 13 15:52:14.490582 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 15:52:14.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.529616 coreos-metadata[939]: Dec 13 15:52:14.513 INFO Fetch successful Dec 13 15:52:14.623740 kernel: audit: type=1130 audit(1734105134.499:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.623759 kernel: audit: type=1131 audit(1734105134.499:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.490645 systemd[1]: Finished flatcar-static-network.service. Dec 13 15:52:14.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.661633 coreos-metadata[939]: Dec 13 15:52:14.540 INFO wrote hostname ci-3510.3.6-a-e7c4cc3cdd to /sysroot/etc/hostname Dec 13 15:52:14.702697 kernel: audit: type=1130 audit(1734105134.632:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.540964 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 15:52:14.774221 ignition[1016]: INFO : Ignition finished successfully Dec 13 15:52:14.775055 systemd[1]: Finished ignition-mount.service. Dec 13 15:52:14.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.791304 systemd[1]: Starting ignition-files.service... Dec 13 15:52:14.860615 kernel: audit: type=1130 audit(1734105134.790:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:14.860684 ignition[1033]: INFO : Ignition 2.14.0 Dec 13 15:52:14.860684 ignition[1033]: INFO : Stage: files Dec 13 15:52:14.860684 ignition[1033]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:14.860684 ignition[1033]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:14.866482 unknown[1033]: wrote ssh authorized keys file for user: core Dec 13 15:52:14.917670 ignition[1033]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:14.917670 ignition[1033]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:52:14.917670 ignition[1033]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:52:14.917670 ignition[1033]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:52:14.917670 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 15:52:15.067829 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Dec 13 15:52:15.481359 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:52:15.481359 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:52:15.531730 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1042) Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 15:52:15.531754 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem168264422" Dec 13 15:52:15.531754 ignition[1033]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem168264422": device or resource busy Dec 13 15:52:15.789835 ignition[1033]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem168264422", trying btrfs: device or resource busy Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem168264422" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem168264422" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem168264422" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem168264422" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:52:15.789835 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 15:52:16.139303 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Dec 13 15:52:16.934669 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:52:16.934669 ignition[1033]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:52:16.934669 ignition[1033]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(11): [started] processing unit "packet-phone-home.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(11): [finished] processing unit "packet-phone-home.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(12): [started] processing unit "containerd.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(12): op(13): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(12): op(13): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(12): [finished] processing unit "containerd.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(14): [started] processing unit "prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(14): op(15): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(14): op(15): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(14): [finished] processing unit "prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(16): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(16): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:52:16.978705 ignition[1033]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:52:16.978705 ignition[1033]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:52:16.978705 ignition[1033]: INFO : files: files passed Dec 13 15:52:16.978705 ignition[1033]: INFO : POST message to Packet Timeline Dec 13 15:52:16.978705 ignition[1033]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:52:17.723479 ignition[1033]: INFO : GET result: OK Dec 13 15:52:18.056797 ignition[1033]: INFO : Ignition finished successfully Dec 13 15:52:18.059617 systemd[1]: Finished ignition-files.service. Dec 13 15:52:18.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.079640 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:52:18.152731 kernel: audit: type=1130 audit(1734105138.073:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.142749 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:52:18.178750 initrd-setup-root-after-ignition[1068]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:52:18.247509 kernel: audit: type=1130 audit(1734105138.188:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.143053 systemd[1]: Starting ignition-quench.service... Dec 13 15:52:18.373350 kernel: audit: type=1130 audit(1734105138.255:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.373378 kernel: audit: type=1131 audit(1734105138.255:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.160840 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:52:18.188928 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:52:18.189006 systemd[1]: Finished ignition-quench.service. Dec 13 15:52:18.534603 kernel: audit: type=1130 audit(1734105138.415:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.534614 kernel: audit: type=1131 audit(1734105138.415:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.255753 systemd[1]: Reached target ignition-complete.target. Dec 13 15:52:18.382074 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:52:18.395702 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:52:18.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.395742 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:52:18.660712 kernel: audit: type=1130 audit(1734105138.583:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.415765 systemd[1]: Reached target initrd-fs.target. Dec 13 15:52:18.543703 systemd[1]: Reached target initrd.target. Dec 13 15:52:18.543762 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:52:18.544117 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:52:18.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.566834 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:52:18.793715 kernel: audit: type=1131 audit(1734105138.717:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.585024 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:52:18.655285 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:52:18.669741 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:52:18.684730 systemd[1]: Stopped target timers.target. Dec 13 15:52:18.698766 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:52:18.698874 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:52:18.718033 systemd[1]: Stopped target initrd.target. Dec 13 15:52:18.786797 systemd[1]: Stopped target basic.target. Dec 13 15:52:18.800738 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:52:18.822878 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:52:18.839819 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:52:18.854855 systemd[1]: Stopped target remote-fs.target. Dec 13 15:52:18.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.870968 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:52:19.054725 kernel: audit: type=1131 audit(1734105138.965:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.887224 systemd[1]: Stopped target sysinit.target. Dec 13 15:52:19.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.903097 systemd[1]: Stopped target local-fs.target. Dec 13 15:52:19.141694 kernel: audit: type=1131 audit(1734105139.063:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:18.918084 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:52:18.935067 systemd[1]: Stopped target swap.target. Dec 13 15:52:18.949976 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:52:18.950342 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:52:18.967307 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:52:19.045784 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:52:19.045866 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:52:19.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.063867 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:52:19.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.063943 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:52:19.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.134809 systemd[1]: Stopped target paths.target. Dec 13 15:52:19.287621 ignition[1083]: INFO : Ignition 2.14.0 Dec 13 15:52:19.287621 ignition[1083]: INFO : Stage: umount Dec 13 15:52:19.287621 ignition[1083]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:52:19.287621 ignition[1083]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:52:19.287621 ignition[1083]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:52:19.287621 ignition[1083]: INFO : umount: umount passed Dec 13 15:52:19.287621 ignition[1083]: INFO : POST message to Packet Timeline Dec 13 15:52:19.287621 ignition[1083]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:52:19.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.148719 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:52:19.152705 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:52:19.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:19.169803 systemd[1]: Stopped target slices.target. Dec 13 15:52:19.184798 systemd[1]: Stopped target sockets.target. Dec 13 15:52:19.199833 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:52:19.199929 systemd[1]: Closed iscsid.socket. Dec 13 15:52:19.213930 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:52:19.214127 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:52:19.233185 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:52:19.233551 systemd[1]: Stopped ignition-files.service. Dec 13 15:52:19.248181 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 15:52:19.248565 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 15:52:19.268288 systemd[1]: Stopping ignition-mount.service... Dec 13 15:52:19.280804 systemd[1]: Stopping iscsiuio.service... Dec 13 15:52:19.295290 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:52:19.302691 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:52:19.302812 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:52:19.333101 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:52:19.333324 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:52:19.366767 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:52:19.367129 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:52:19.367180 systemd[1]: Stopped iscsiuio.service. Dec 13 15:52:19.372058 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:52:19.372102 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:52:19.399081 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:52:19.399181 systemd[1]: Closed iscsiuio.socket. Dec 13 15:52:19.417065 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:52:19.417171 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:52:20.077954 ignition[1083]: INFO : GET result: OK Dec 13 15:52:20.622450 ignition[1083]: INFO : Ignition finished successfully Dec 13 15:52:20.625255 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:52:20.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.625528 systemd[1]: Stopped ignition-mount.service. Dec 13 15:52:20.640093 systemd[1]: Stopped target network.target. Dec 13 15:52:20.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.655714 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:52:20.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.655942 systemd[1]: Stopped ignition-disks.service. Dec 13 15:52:20.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.670907 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:52:20.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.671030 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:52:20.685899 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:52:20.686030 systemd[1]: Stopped ignition-setup.service. Dec 13 15:52:20.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.703002 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:52:20.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.782000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:52:20.703147 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:52:20.719291 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:52:20.729623 systemd-networkd[877]: enp1s0f1np1: DHCPv6 lease lost Dec 13 15:52:20.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.735001 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:52:20.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.738708 systemd-networkd[877]: enp1s0f0np0: DHCPv6 lease lost Dec 13 15:52:20.856000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:52:20.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.749402 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:52:20.749707 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:52:20.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.767202 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:52:20.767572 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:52:20.782823 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:52:20.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.782843 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:52:20.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.803513 systemd[1]: Stopping network-cleanup.service... Dec 13 15:52:20.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.815702 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:52:20.815848 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:52:21.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.832875 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:52:21.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.833008 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:52:21.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.848996 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:52:21.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:21.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.849122 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:52:20.866177 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:52:20.884609 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:52:20.886052 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:52:20.886414 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:52:20.899279 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:52:20.899414 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:52:20.911831 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:52:20.911934 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:52:20.927721 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:52:20.927849 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:52:20.943011 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:52:20.943162 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:52:20.958919 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:52:20.959044 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:52:20.975852 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:52:20.988577 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 15:52:21.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:20.988605 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 15:52:21.004797 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:52:21.233000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:52:21.233000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:52:21.233000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:52:21.234000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:52:21.234000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:52:21.004826 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:52:21.312564 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Dec 13 15:52:21.312588 systemd-journald[268]: Failed to send stream file descriptor to service manager: Connection refused Dec 13 15:52:21.020650 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:52:21.312627 iscsid[900]: iscsid shutting down. Dec 13 15:52:21.020689 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:52:21.038021 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 15:52:21.038779 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:52:21.038898 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:52:21.192068 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:52:21.192283 systemd[1]: Stopped network-cleanup.service. Dec 13 15:52:21.205007 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:52:21.225231 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:52:21.233480 systemd[1]: Switching root. Dec 13 15:52:21.312863 systemd-journald[268]: Journal stopped Dec 13 15:52:25.080174 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:52:25.080188 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:52:25.080196 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:52:25.080202 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:52:25.080207 kernel: SELinux: policy capability open_perms=1 Dec 13 15:52:25.080212 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:52:25.080219 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:52:25.080224 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:52:25.080230 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:52:25.080236 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:52:25.080242 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:52:25.080248 systemd[1]: Successfully loaded SELinux policy in 330.742ms. Dec 13 15:52:25.080255 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.878ms. Dec 13 15:52:25.080262 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:52:25.080270 systemd[1]: Detected architecture x86-64. Dec 13 15:52:25.080277 systemd[1]: Detected first boot. Dec 13 15:52:25.080283 systemd[1]: Hostname set to . Dec 13 15:52:25.080289 systemd[1]: Initializing machine ID from random generator. Dec 13 15:52:25.080295 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:52:25.080301 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:52:25.080308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:52:25.080316 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:52:25.080323 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:52:25.080329 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:52:25.080336 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:52:25.080342 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:52:25.080349 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:52:25.080356 systemd[1]: Created slice system-getty.slice. Dec 13 15:52:25.080363 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:52:25.080369 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:52:25.080376 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:52:25.080382 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:52:25.080389 systemd[1]: Created slice user.slice. Dec 13 15:52:25.080396 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:52:25.080402 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:52:25.080408 systemd[1]: Set up automount boot.automount. Dec 13 15:52:25.080416 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:52:25.080422 systemd[1]: Reached target integritysetup.target. Dec 13 15:52:25.080429 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:52:25.080435 systemd[1]: Reached target remote-fs.target. Dec 13 15:52:25.080443 systemd[1]: Reached target slices.target. Dec 13 15:52:25.080450 systemd[1]: Reached target swap.target. Dec 13 15:52:25.080457 systemd[1]: Reached target torcx.target. Dec 13 15:52:25.080463 systemd[1]: Reached target veritysetup.target. Dec 13 15:52:25.080471 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:52:25.080477 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:52:25.080484 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 15:52:25.080512 kernel: audit: type=1400 audit(1734105144.325:92): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:52:25.080534 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:52:25.080541 kernel: audit: type=1335 audit(1734105144.325:93): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 15:52:25.080547 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:52:25.080554 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:52:25.080561 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:52:25.080568 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:52:25.080575 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:52:25.080582 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:52:25.080590 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:52:25.080597 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:52:25.080603 systemd[1]: Mounting media.mount... Dec 13 15:52:25.080610 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:25.080617 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:52:25.080624 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:52:25.080630 systemd[1]: Mounting tmp.mount... Dec 13 15:52:25.080637 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:52:25.080644 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:52:25.080652 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:52:25.080659 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:52:25.080666 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:52:25.080672 systemd[1]: Starting modprobe@drm.service... Dec 13 15:52:25.080679 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:52:25.080686 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:52:25.080693 kernel: fuse: init (API version 7.34) Dec 13 15:52:25.080699 systemd[1]: Starting modprobe@loop.service... Dec 13 15:52:25.080705 kernel: loop: module loaded Dec 13 15:52:25.080713 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:52:25.080720 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 15:52:25.080726 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 15:52:25.080733 systemd[1]: Starting systemd-journald.service... Dec 13 15:52:25.080740 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:52:25.080746 kernel: audit: type=1305 audit(1734105145.076:94): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:52:25.080755 systemd-journald[1277]: Journal started Dec 13 15:52:25.080781 systemd-journald[1277]: Runtime Journal (/run/log/journal/e73a51db9b5849b496ebb7c797b43608) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:52:24.325000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:52:24.325000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 15:52:25.076000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:52:25.076000 audit[1277]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc54911b20 a2=4000 a3=7ffc54911bbc items=0 ppid=1 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:25.076000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:52:25.129568 kernel: audit: type=1300 audit(1734105145.076:94): arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc54911b20 a2=4000 a3=7ffc54911bbc items=0 ppid=1 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:25.129589 kernel: audit: type=1327 audit(1734105145.076:94): proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:52:25.243552 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:52:25.270545 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:52:25.297544 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:52:25.341533 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:25.360681 systemd[1]: Started systemd-journald.service. Dec 13 15:52:25.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.368351 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:52:25.416685 kernel: audit: type=1130 audit(1734105145.367:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.422757 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:52:25.429752 systemd[1]: Mounted media.mount. Dec 13 15:52:25.436734 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:52:25.445719 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:52:25.453703 systemd[1]: Mounted tmp.mount. Dec 13 15:52:25.460855 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:52:25.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.469861 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:52:25.517537 kernel: audit: type=1130 audit(1734105145.469:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.525811 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:52:25.525889 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:52:25.575667 kernel: audit: type=1130 audit(1734105145.525:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.582814 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:52:25.582886 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:52:25.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.633534 kernel: audit: type=1130 audit(1734105145.582:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.633549 kernel: audit: type=1131 audit(1734105145.582:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.693815 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:52:25.693887 systemd[1]: Finished modprobe@drm.service. Dec 13 15:52:25.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.702848 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:52:25.702920 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:52:25.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.711814 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:52:25.711885 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:52:25.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.720799 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:52:25.720874 systemd[1]: Finished modprobe@loop.service. Dec 13 15:52:25.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.729857 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:52:25.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.738836 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:52:25.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.747960 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:52:25.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.757066 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:52:25.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.766104 systemd[1]: Reached target network-pre.target. Dec 13 15:52:25.776651 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:52:25.785222 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:52:25.792730 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:52:25.794599 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:52:25.802229 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:52:25.806237 systemd-journald[1277]: Time spent on flushing to /var/log/journal/e73a51db9b5849b496ebb7c797b43608 is 13.998ms for 1519 entries. Dec 13 15:52:25.806237 systemd-journald[1277]: System Journal (/var/log/journal/e73a51db9b5849b496ebb7c797b43608) is 8.0M, max 195.6M, 187.6M free. Dec 13 15:52:25.855138 systemd-journald[1277]: Received client request to flush runtime journal. Dec 13 15:52:25.818621 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:52:25.819128 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:52:25.836631 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:52:25.837225 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:52:25.844172 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:52:25.851149 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:52:25.858868 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:52:25.866642 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:52:25.874761 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:52:25.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.882770 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:52:25.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.890707 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:52:25.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.898752 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:52:25.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:25.908662 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:52:25.918328 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:52:25.927757 udevadm[1304]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 15:52:25.938129 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:52:25.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:26.102235 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:52:26.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:26.111442 systemd[1]: Starting systemd-udevd.service... Dec 13 15:52:26.123035 systemd-udevd[1311]: Using default interface naming scheme 'v252'. Dec 13 15:52:26.141268 systemd[1]: Started systemd-udevd.service. Dec 13 15:52:26.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:26.153312 systemd[1]: Found device dev-ttyS1.device. Dec 13 15:52:26.178501 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 15:52:26.200533 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 15:52:26.200619 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:52:26.203496 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:52:26.203536 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1316) Dec 13 15:52:26.213701 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 15:52:26.214911 systemd[1]: Starting systemd-networkd.service... Dec 13 15:52:26.270496 kernel: IPMI message handler: version 39.2 Dec 13 15:52:26.282722 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:52:26.291493 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:52:26.202000 audit[1369]: AVC avc: denied { confidentiality } for pid=1369 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:52:26.349501 kernel: ipmi device interface Dec 13 15:52:26.202000 audit[1369]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f4e6ffe0b0 a1=4d98c a2=7fd3db711bc5 a3=5 items=42 ppid=1311 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:26.202000 audit: CWD cwd="/" Dec 13 15:52:26.202000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=1 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=2 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=3 name=(null) inode=22234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=4 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=5 name=(null) inode=22235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=6 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=7 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=8 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=9 name=(null) inode=22237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=10 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=11 name=(null) inode=22238 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=12 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=13 name=(null) inode=22239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=14 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=15 name=(null) inode=22240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=16 name=(null) inode=22236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=17 name=(null) inode=22241 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=18 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=19 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=20 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=21 name=(null) inode=22243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=22 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=23 name=(null) inode=22244 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=24 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=25 name=(null) inode=22245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=26 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=27 name=(null) inode=22246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=28 name=(null) inode=22242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=29 name=(null) inode=22247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=30 name=(null) inode=22233 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=31 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=32 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=33 name=(null) inode=22249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=34 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=35 name=(null) inode=22250 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=36 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=37 name=(null) inode=22251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=38 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=39 name=(null) inode=22252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=40 name=(null) inode=22248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PATH item=41 name=(null) inode=22253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:52:26.202000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:52:26.409814 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 15:52:26.433644 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 15:52:26.433722 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Dec 13 15:52:26.439765 systemd[1]: Started systemd-userdbd.service. Dec 13 15:52:26.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:26.488171 kernel: ipmi_si: IPMI System Interface driver Dec 13 15:52:26.488203 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 15:52:26.533362 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 15:52:26.533381 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 15:52:26.533395 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 15:52:26.699070 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 15:52:26.699149 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 15:52:26.699226 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 15:52:26.699300 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 15:52:26.699313 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 15:52:26.699373 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 15:52:26.699389 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 15:52:26.768902 systemd-networkd[1392]: bond0: netdev ready Dec 13 15:52:26.770941 systemd-networkd[1392]: lo: Link UP Dec 13 15:52:26.770944 systemd-networkd[1392]: lo: Gained carrier Dec 13 15:52:26.771421 systemd-networkd[1392]: Enumeration completed Dec 13 15:52:26.771529 systemd[1]: Started systemd-networkd.service. Dec 13 15:52:26.771719 systemd-networkd[1392]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 15:52:26.772354 systemd-networkd[1392]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:f9.network. Dec 13 15:52:26.793909 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 15:52:26.815764 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 15:52:26.815865 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 15:52:26.815939 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 15:52:26.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:26.886452 kernel: intel_rapl_common: Found RAPL domain package Dec 13 15:52:26.886481 kernel: intel_rapl_common: Found RAPL domain core Dec 13 15:52:26.886502 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 15:52:26.905654 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 15:52:26.949566 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 15:52:26.949591 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:52:26.993551 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 15:52:26.993578 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:52:26.993620 systemd-networkd[1392]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:f8.network. Dec 13 15:52:27.141491 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:52:27.477491 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:52:28.087525 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:52:28.113556 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 15:52:28.113613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 15:52:28.134170 systemd-networkd[1392]: bond0: Link UP Dec 13 15:52:28.134384 systemd-networkd[1392]: enp1s0f1np1: Link UP Dec 13 15:52:28.134542 systemd-networkd[1392]: enp1s0f1np1: Gained carrier Dec 13 15:52:28.135757 systemd-networkd[1392]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:de:84:f8.network. Dec 13 15:52:28.173290 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Dec 13 15:52:28.173346 kernel: bond0: active interface up! Dec 13 15:52:28.195548 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Dec 13 15:52:28.228519 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:52:28.235272 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:52:28.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.244331 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:52:28.259428 lvm[1417]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:52:28.300926 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:52:28.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.317685 systemd[1]: Reached target cryptsetup.target. Dec 13 15:52:28.324544 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.341215 systemd[1]: Starting lvm2-activation.service... Dec 13 15:52:28.343350 lvm[1420]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:52:28.347535 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.369491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.391489 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.413525 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.414030 systemd[1]: Finished lvm2-activation.service. Dec 13 15:52:28.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.430690 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:52:28.436531 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.452589 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:52:28.452604 systemd[1]: Reached target local-fs.target. Dec 13 15:52:28.458520 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.475590 systemd[1]: Reached target machines.target. Dec 13 15:52:28.479533 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.497250 systemd[1]: Starting ldconfig.service... Dec 13 15:52:28.500542 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.516254 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:52:28.516275 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:52:28.516854 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:52:28.521492 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.537044 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:52:28.543490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.561130 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:52:28.563492 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.563624 systemd[1]: Starting systemd-sysext.service... Dec 13 15:52:28.563820 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1424 (bootctl) Dec 13 15:52:28.564548 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:52:28.583534 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.590160 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:52:28.603489 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.620535 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:52:28.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.622732 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:52:28.622840 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:52:28.623492 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.642515 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.657525 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 15:52:28.657550 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.692493 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.711493 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.729490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.729525 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:52:28.729899 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:52:28.730310 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:52:28.743490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.755814 systemd-fsck[1437]: fsck.fat 4.2 (2021-01-31) Dec 13 15:52:28.755814 systemd-fsck[1437]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 15:52:28.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.777832 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:52:28.780491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.799490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.801364 systemd[1]: Mounting boot.mount... Dec 13 15:52:28.817576 systemd[1]: Mounted boot.mount. Dec 13 15:52:28.819535 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.838516 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.846461 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:52:28.853536 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 15:52:28.853569 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.864969 (sd-sysext)[1445]: Using extensions 'kubernetes'. Dec 13 15:52:28.865142 (sd-sysext)[1445]: Merged extensions into '/usr'. Dec 13 15:52:28.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:28.886499 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.893724 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:28.894509 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:52:28.903491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.919492 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.919657 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:52:28.920352 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:52:28.936100 ldconfig[1423]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:52:28.937490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.949429 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:52:28.955489 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.971113 systemd[1]: Starting modprobe@loop.service... Dec 13 15:52:28.973491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.988600 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:52:28.988669 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:52:28.988735 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:28.989490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:28.990633 systemd[1]: Finished ldconfig.service. Dec 13 15:52:29.004490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.019723 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:52:29.020530 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.035749 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:52:29.035826 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:52:29.038542 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.054761 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:52:29.054834 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:52:29.055491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.072529 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.072757 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:52:29.072831 systemd[1]: Finished modprobe@loop.service. Dec 13 15:52:29.089490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.090768 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:52:29.090827 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.091355 systemd[1]: Finished systemd-sysext.service. Dec 13 15:52:29.106494 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.117970 systemd[1]: Starting ensure-sysext.service... Dec 13 15:52:29.121547 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.136521 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.138067 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:52:29.152491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.156633 systemd-tmpfiles[1463]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:52:29.157214 systemd-tmpfiles[1463]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:52:29.158985 systemd-tmpfiles[1463]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:52:29.163270 systemd[1]: Reloading. Dec 13 15:52:29.165489 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.178490 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.184035 /usr/lib/systemd/system-generators/torcx-generator[1483]: time="2024-12-13T15:52:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:52:29.184060 /usr/lib/systemd/system-generators/torcx-generator[1483]: time="2024-12-13T15:52:29Z" level=info msg="torcx already run" Dec 13 15:52:29.191496 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.192015 systemd-networkd[1392]: enp1s0f0np0: Link UP Dec 13 15:52:29.192201 systemd-networkd[1392]: bond0: Gained carrier Dec 13 15:52:29.192290 systemd-networkd[1392]: enp1s0f0np0: Gained carrier Dec 13 15:52:29.213261 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Dec 13 15:52:29.213307 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Dec 13 15:52:29.214919 systemd-networkd[1392]: enp1s0f1np1: Link DOWN Dec 13 15:52:29.214922 systemd-networkd[1392]: enp1s0f1np1: Lost carrier Dec 13 15:52:29.241113 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:52:29.241120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:52:29.253841 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:52:29.294815 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:52:29.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:29.304168 systemd[1]: Starting audit-rules.service... Dec 13 15:52:29.312154 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:52:29.317000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:52:29.317000 audit[1567]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcab653760 a2=420 a3=0 items=0 ppid=1550 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:29.317000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:52:29.319543 augenrules[1567]: No rules Dec 13 15:52:29.321276 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:52:29.331415 systemd[1]: Starting systemd-resolved.service... Dec 13 15:52:29.340268 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:52:29.348143 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:52:29.354918 systemd[1]: Finished audit-rules.service. Dec 13 15:52:29.361722 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:52:29.370685 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:52:29.383445 systemd[1]: Starting systemd-update-done.service... Dec 13 15:52:29.392079 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:52:29.392705 systemd[1]: Finished systemd-update-done.service. Dec 13 15:52:29.401951 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:52:29.411235 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.411955 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:52:29.419209 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:52:29.420433 systemd-resolved[1574]: Positive Trust Anchors: Dec 13 15:52:29.420439 systemd-resolved[1574]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:52:29.420458 systemd-resolved[1574]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:52:29.424230 systemd-resolved[1574]: Using system hostname 'ci-3510.3.6-a-e7c4cc3cdd'. Dec 13 15:52:29.430492 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:52:29.430610 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 15:52:29.437919 systemd[1]: Starting modprobe@loop.service... Dec 13 15:52:29.441522 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Dec 13 15:52:29.451522 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Dec 13 15:52:29.452553 systemd-networkd[1392]: enp1s0f1np1: Link UP Dec 13 15:52:29.452713 systemd-networkd[1392]: enp1s0f1np1: Gained carrier Dec 13 15:52:29.474491 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Dec 13 15:52:29.476550 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.476623 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:52:29.476681 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:52:29.477110 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:52:29.486800 systemd[1]: Started systemd-resolved.service. Dec 13 15:52:29.495708 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:52:29.495789 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:52:29.504709 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:52:29.504787 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:52:29.512705 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:52:29.512787 systemd[1]: Finished modprobe@loop.service. Dec 13 15:52:29.520729 systemd[1]: Reached target network.target. Dec 13 15:52:29.528565 systemd[1]: Reached target nss-lookup.target. Dec 13 15:52:29.536568 systemd[1]: Reached target time-set.target. Dec 13 15:52:29.544552 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:52:29.544621 systemd[1]: Reached target sysinit.target. Dec 13 15:52:29.552610 systemd[1]: Started motdgen.path. Dec 13 15:52:29.559582 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:52:29.569650 systemd[1]: Started logrotate.timer. Dec 13 15:52:29.577611 systemd[1]: Started mdadm.timer. Dec 13 15:52:29.584572 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:52:29.593546 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:52:29.593604 systemd[1]: Reached target paths.target. Dec 13 15:52:29.601562 systemd[1]: Reached target timers.target. Dec 13 15:52:29.609715 systemd[1]: Listening on dbus.socket. Dec 13 15:52:29.618150 systemd[1]: Starting docker.socket... Dec 13 15:52:29.625396 systemd[1]: Listening on sshd.socket. Dec 13 15:52:29.632601 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:52:29.632660 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.634503 systemd[1]: Listening on docker.socket. Dec 13 15:52:29.641900 systemd[1]: Reached target sockets.target. Dec 13 15:52:29.650562 systemd[1]: Reached target basic.target. Dec 13 15:52:29.658600 systemd[1]: System is tainted: cgroupsv1 Dec 13 15:52:29.658633 systemd[1]: Stopped target timers.target. Dec 13 15:52:29.666512 systemd[1]: Stopping timers.target... Dec 13 15:52:29.674537 systemd[1]: Reached target timers.target. Dec 13 15:52:29.681539 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:29.681585 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.681632 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:52:29.682248 systemd[1]: Starting containerd.service... Dec 13 15:52:29.690013 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:52:29.700094 systemd[1]: Starting coreos-metadata.service... Dec 13 15:52:29.707143 systemd[1]: Starting dbus.service... Dec 13 15:52:29.714186 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:52:29.719055 coreos-metadata[1594]: Dec 13 15:52:29.718 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:52:29.719260 jq[1601]: false Dec 13 15:52:29.722266 systemd[1]: Starting extend-filesystems.service... Dec 13 15:52:29.725693 dbus-daemon[1600]: [system] SELinux support is enabled Dec 13 15:52:29.730175 extend-filesystems[1604]: Found loop1 Dec 13 15:52:29.730175 extend-filesystems[1604]: Found sda Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda1 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda2 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda3 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found usr Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda4 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda6 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda7 Dec 13 15:52:29.752366 extend-filesystems[1604]: Found sda9 Dec 13 15:52:29.752366 extend-filesystems[1604]: Checking size of /dev/sda9 Dec 13 15:52:29.752366 extend-filesystems[1604]: Resized partition /dev/sda9 Dec 13 15:52:29.896564 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Dec 13 15:52:29.730399 systemd[1]: Starting motdgen.service... Dec 13 15:52:29.896646 coreos-metadata[1597]: Dec 13 15:52:29.730 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:52:29.896785 extend-filesystems[1619]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:52:29.751596 systemd[1]: Starting prepare-helm.service... Dec 13 15:52:29.910106 dbus-daemon[1600]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 15:52:29.764673 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:52:29.779363 systemd[1]: Starting sshd-keygen.service... Dec 13 15:52:29.794574 systemd[1]: Starting systemd-logind.service... Dec 13 15:52:29.808544 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:52:29.809261 systemd[1]: Starting tcsd.service... Dec 13 15:52:29.914533 update_engine[1643]: I1213 15:52:29.875265 1643 main.cc:92] Flatcar Update Engine starting Dec 13 15:52:29.914533 update_engine[1643]: I1213 15:52:29.880394 1643 update_check_scheduler.cc:74] Next update check in 11m54s Dec 13 15:52:29.820498 systemd-logind[1640]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 15:52:29.914953 jq[1644]: true Dec 13 15:52:29.820509 systemd-logind[1640]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 15:52:29.820519 systemd-logind[1640]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 15:52:29.915225 tar[1648]: linux-amd64/helm Dec 13 15:52:29.820627 systemd-logind[1640]: New seat seat0. Dec 13 15:52:29.915464 jq[1650]: true Dec 13 15:52:29.829358 systemd[1]: Starting update-engine.service... Dec 13 15:52:29.845240 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:52:29.861523 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:52:29.862593 systemd[1]: Started dbus.service. Dec 13 15:52:29.871740 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:52:29.871876 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:52:29.872088 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:52:29.872193 systemd[1]: Finished motdgen.service. Dec 13 15:52:29.883181 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:52:29.883313 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:52:29.913663 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 15:52:29.913945 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 15:52:29.917341 systemd[1]: Finished ensure-sysext.service. Dec 13 15:52:29.919437 env[1651]: time="2024-12-13T15:52:29.919414289Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:52:29.927753 env[1651]: time="2024-12-13T15:52:29.927709827Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:52:29.928452 env[1651]: time="2024-12-13T15:52:29.928413106Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.929090 env[1651]: time="2024-12-13T15:52:29.929034038Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:52:29.929090 env[1651]: time="2024-12-13T15:52:29.929053728Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.929234 env[1651]: time="2024-12-13T15:52:29.929191549Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:52:29.929234 env[1651]: time="2024-12-13T15:52:29.929205669Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.929234 env[1651]: time="2024-12-13T15:52:29.929213799Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:52:29.929234 env[1651]: time="2024-12-13T15:52:29.929219171Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.930586 systemd[1]: Started systemd-logind.service. Dec 13 15:52:29.930844 env[1651]: time="2024-12-13T15:52:29.930804710Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.930979 env[1651]: time="2024-12-13T15:52:29.930941996Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:52:29.931076 env[1651]: time="2024-12-13T15:52:29.931033375Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:52:29.931076 env[1651]: time="2024-12-13T15:52:29.931043868Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:52:29.932978 env[1651]: time="2024-12-13T15:52:29.932936472Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:52:29.932978 env[1651]: time="2024-12-13T15:52:29.932951202Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:52:29.941222 bash[1682]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:52:29.941580 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:52:29.943417 env[1651]: time="2024-12-13T15:52:29.943376206Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:52:29.943417 env[1651]: time="2024-12-13T15:52:29.943393076Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:52:29.943417 env[1651]: time="2024-12-13T15:52:29.943400998Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943418281Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943432899Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943442061Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943450997Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943459962Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943467366Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943483 env[1651]: time="2024-12-13T15:52:29.943476395Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943596 env[1651]: time="2024-12-13T15:52:29.943493847Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943596 env[1651]: time="2024-12-13T15:52:29.943505496Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:52:29.943596 env[1651]: time="2024-12-13T15:52:29.943567047Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:52:29.943642 env[1651]: time="2024-12-13T15:52:29.943612345Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:52:29.943872 env[1651]: time="2024-12-13T15:52:29.943834067Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:52:29.943872 env[1651]: time="2024-12-13T15:52:29.943851501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943872 env[1651]: time="2024-12-13T15:52:29.943861012Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943890849Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943899405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943906370Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943912708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943918865Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943925350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943931710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.943939 env[1651]: time="2024-12-13T15:52:29.943937726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.944134 env[1651]: time="2024-12-13T15:52:29.943944516Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:52:29.944252 env[1651]: time="2024-12-13T15:52:29.944228881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.944278 env[1651]: time="2024-12-13T15:52:29.944257759Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.944295 env[1651]: time="2024-12-13T15:52:29.944275158Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.944312 env[1651]: time="2024-12-13T15:52:29.944292357Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:52:29.944481 env[1651]: time="2024-12-13T15:52:29.944371061Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:52:29.944514 env[1651]: time="2024-12-13T15:52:29.944483204Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:52:29.944514 env[1651]: time="2024-12-13T15:52:29.944505836Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:52:29.944554 env[1651]: time="2024-12-13T15:52:29.944533310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:52:29.944720 env[1651]: time="2024-12-13T15:52:29.944659394Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:52:29.944720 env[1651]: time="2024-12-13T15:52:29.944695198Z" level=info msg="Connect containerd service" Dec 13 15:52:29.944720 env[1651]: time="2024-12-13T15:52:29.944716286Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945006901Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945091360Z" level=info msg="Start subscribing containerd event" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945121979Z" level=info msg="Start recovering state" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945127626Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945155396Z" level=info msg="Start event monitor" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945156802Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945162979Z" level=info msg="Start snapshots syncer" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945173877Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945178340Z" level=info msg="Start streaming server" Dec 13 15:52:29.946497 env[1651]: time="2024-12-13T15:52:29.945189857Z" level=info msg="containerd successfully booted in 0.026160s" Dec 13 15:52:29.950735 systemd[1]: Started containerd.service. Dec 13 15:52:29.957600 systemd[1]: Started update-engine.service. Dec 13 15:52:29.966126 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:52:29.966997 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:52:29.968643 jq[1696]: false Dec 13 15:52:29.973568 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:52:29.974472 systemd[1]: Started locksmithd.service. Dec 13 15:52:29.982338 systemd[1]: Starting modprobe@drm.service... Dec 13 15:52:29.989317 systemd[1]: Starting motdgen.service... Dec 13 15:52:29.996425 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:52:30.003575 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:52:30.003679 systemd[1]: Reached target system-config.target. Dec 13 15:52:30.012380 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:52:30.020577 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:52:30.020685 systemd[1]: Reached target user-config.target. Dec 13 15:52:30.030946 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:52:30.031081 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:52:30.031367 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:52:30.031446 systemd[1]: Finished modprobe@drm.service. Dec 13 15:52:30.035380 locksmithd[1698]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:52:30.039795 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:52:30.039908 systemd[1]: Finished motdgen.service. Dec 13 15:52:30.046754 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:52:30.046865 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:52:30.164897 tar[1648]: linux-amd64/LICENSE Dec 13 15:52:30.164897 tar[1648]: linux-amd64/README.md Dec 13 15:52:30.167570 systemd[1]: Finished prepare-helm.service. Dec 13 15:52:30.222535 systemd-networkd[1392]: bond0: Gained IPv6LL Dec 13 15:52:30.226541 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Dec 13 15:52:30.255561 extend-filesystems[1619]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 15:52:30.255561 extend-filesystems[1619]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 15:52:30.255561 extend-filesystems[1619]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Dec 13 15:52:30.292588 extend-filesystems[1604]: Resized filesystem in /dev/sda9 Dec 13 15:52:30.292588 extend-filesystems[1604]: Found sdb Dec 13 15:52:30.255956 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:52:30.256074 systemd[1]: Finished extend-filesystems.service. Dec 13 15:52:30.543582 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:52:30.552857 systemd[1]: Reached target network-online.target. Dec 13 15:52:30.561632 systemd[1]: Starting kubelet.service... Dec 13 15:52:30.594288 sshd_keygen[1639]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:52:30.606096 systemd[1]: Finished sshd-keygen.service. Dec 13 15:52:30.613642 systemd[1]: Starting issuegen.service... Dec 13 15:52:30.620857 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:52:30.620968 systemd[1]: Finished issuegen.service. Dec 13 15:52:30.628458 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:52:30.636989 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:52:30.646386 systemd[1]: Started getty@tty1.service. Dec 13 15:52:30.654364 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 15:52:30.662742 systemd[1]: Reached target getty.target. Dec 13 15:52:31.180688 systemd[1]: Started kubelet.service. Dec 13 15:52:31.730693 kubelet[1753]: E1213 15:52:31.730657 1753 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:52:31.731997 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:52:31.732086 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:52:32.492670 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 15:52:35.373293 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 15:52:35.373445 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 15:52:35.600005 coreos-metadata[1597]: Dec 13 15:52:35.599 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:52:35.600889 coreos-metadata[1594]: Dec 13 15:52:35.599 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:52:35.640935 systemd-timesyncd[1576]: Contacted time server 74.208.117.38:123 (0.flatcar.pool.ntp.org). Dec 13 15:52:35.641087 systemd-timesyncd[1576]: Initial clock synchronization to Fri 2024-12-13 15:52:35.707706 UTC. Dec 13 15:52:35.676385 login[1747]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:52:35.683399 login[1746]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:52:35.685068 systemd-logind[1640]: New session 1 of user core. Dec 13 15:52:35.685847 systemd[1]: Created slice user-500.slice. Dec 13 15:52:35.686420 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:52:35.687734 systemd-logind[1640]: New session 2 of user core. Dec 13 15:52:35.692085 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:52:35.692850 systemd[1]: Starting user@500.service... Dec 13 15:52:35.694949 (systemd)[1778]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:35.771891 systemd[1778]: Queued start job for default target default.target. Dec 13 15:52:35.771995 systemd[1778]: Reached target paths.target. Dec 13 15:52:35.772006 systemd[1778]: Reached target sockets.target. Dec 13 15:52:35.772014 systemd[1778]: Reached target timers.target. Dec 13 15:52:35.772021 systemd[1778]: Reached target basic.target. Dec 13 15:52:35.772041 systemd[1778]: Reached target default.target. Dec 13 15:52:35.772054 systemd[1778]: Startup finished in 74ms. Dec 13 15:52:35.772120 systemd[1]: Started user@500.service. Dec 13 15:52:35.772779 systemd[1]: Started session-1.scope. Dec 13 15:52:35.773087 systemd[1]: Started session-2.scope. Dec 13 15:52:36.203691 systemd[1]: Created slice system-sshd.slice. Dec 13 15:52:36.204424 systemd[1]: Started sshd@0-147.75.203.63:22-139.178.89.65:35892.service. Dec 13 15:52:36.253591 sshd[1800]: Accepted publickey for core from 139.178.89.65 port 35892 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:36.254551 sshd[1800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:36.257575 systemd-logind[1640]: New session 3 of user core. Dec 13 15:52:36.258266 systemd[1]: Started session-3.scope. Dec 13 15:52:36.310706 systemd[1]: Started sshd@1-147.75.203.63:22-139.178.89.65:35904.service. Dec 13 15:52:36.340718 sshd[1805]: Accepted publickey for core from 139.178.89.65 port 35904 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:36.341406 sshd[1805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:36.343667 systemd-logind[1640]: New session 4 of user core. Dec 13 15:52:36.344074 systemd[1]: Started session-4.scope. Dec 13 15:52:36.395689 sshd[1805]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:36.397956 systemd[1]: Started sshd@2-147.75.203.63:22-139.178.89.65:35906.service. Dec 13 15:52:36.398458 systemd[1]: sshd@1-147.75.203.63:22-139.178.89.65:35904.service: Deactivated successfully. Dec 13 15:52:36.399237 systemd-logind[1640]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:52:36.399289 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:52:36.400144 systemd-logind[1640]: Removed session 4. Dec 13 15:52:36.431012 sshd[1811]: Accepted publickey for core from 139.178.89.65 port 35906 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:36.431879 sshd[1811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:36.434903 systemd-logind[1640]: New session 5 of user core. Dec 13 15:52:36.435417 systemd[1]: Started session-5.scope. Dec 13 15:52:36.490180 sshd[1811]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:36.491417 systemd[1]: sshd@2-147.75.203.63:22-139.178.89.65:35906.service: Deactivated successfully. Dec 13 15:52:36.492029 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:52:36.492068 systemd-logind[1640]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:52:36.492497 systemd-logind[1640]: Removed session 5. Dec 13 15:52:36.600960 coreos-metadata[1594]: Dec 13 15:52:36.600 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:52:36.601873 coreos-metadata[1597]: Dec 13 15:52:36.600 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:52:37.407449 coreos-metadata[1597]: Dec 13 15:52:37.407 INFO Fetch successful Dec 13 15:52:37.412276 coreos-metadata[1594]: Dec 13 15:52:37.412 INFO Fetch successful Dec 13 15:52:37.487115 systemd[1]: Finished coreos-metadata.service. Dec 13 15:52:37.488053 systemd[1]: Started packet-phone-home.service. Dec 13 15:52:37.489421 unknown[1594]: wrote ssh authorized keys file for user: core Dec 13 15:52:37.496081 curl[1824]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 15:52:37.496232 curl[1824]: Dload Upload Total Spent Left Speed Dec 13 15:52:37.504925 update-ssh-keys[1826]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:52:37.506206 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:52:37.507187 systemd[1]: Reached target multi-user.target. Dec 13 15:52:37.510881 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:52:37.518930 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:52:37.519052 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:52:37.519178 systemd[1]: Startup finished in 24.510s (kernel) + 16.083s (userspace) = 40.594s. Dec 13 15:52:37.818090 curl[1824]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 15:52:37.820671 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 15:52:41.957407 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:52:41.957974 systemd[1]: Stopped kubelet.service. Dec 13 15:52:41.960643 systemd[1]: Starting kubelet.service... Dec 13 15:52:42.159746 systemd[1]: Started kubelet.service. Dec 13 15:52:42.182714 kubelet[1840]: E1213 15:52:42.182658 1840 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:52:42.185073 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:52:42.185161 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:52:46.543475 systemd[1]: Started sshd@3-147.75.203.63:22-139.178.89.65:49608.service. Dec 13 15:52:46.574050 sshd[1858]: Accepted publickey for core from 139.178.89.65 port 49608 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:46.574950 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:46.578269 systemd-logind[1640]: New session 6 of user core. Dec 13 15:52:46.578875 systemd[1]: Started session-6.scope. Dec 13 15:52:46.634244 sshd[1858]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:46.635970 systemd[1]: Started sshd@4-147.75.203.63:22-139.178.89.65:49618.service. Dec 13 15:52:46.636300 systemd[1]: sshd@3-147.75.203.63:22-139.178.89.65:49608.service: Deactivated successfully. Dec 13 15:52:46.636846 systemd-logind[1640]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:52:46.636848 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:52:46.637311 systemd-logind[1640]: Removed session 6. Dec 13 15:52:46.666255 sshd[1864]: Accepted publickey for core from 139.178.89.65 port 49618 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:46.667105 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:46.670187 systemd-logind[1640]: New session 7 of user core. Dec 13 15:52:46.670789 systemd[1]: Started session-7.scope. Dec 13 15:52:46.723595 sshd[1864]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:46.725103 systemd[1]: Started sshd@5-147.75.203.63:22-139.178.89.65:49624.service. Dec 13 15:52:46.725360 systemd[1]: sshd@4-147.75.203.63:22-139.178.89.65:49618.service: Deactivated successfully. Dec 13 15:52:46.725953 systemd-logind[1640]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:52:46.725955 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:52:46.726415 systemd-logind[1640]: Removed session 7. Dec 13 15:52:46.756224 sshd[1870]: Accepted publickey for core from 139.178.89.65 port 49624 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:46.757248 sshd[1870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:46.760941 systemd-logind[1640]: New session 8 of user core. Dec 13 15:52:46.761691 systemd[1]: Started session-8.scope. Dec 13 15:52:46.829753 sshd[1870]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:46.835938 systemd[1]: Started sshd@6-147.75.203.63:22-139.178.89.65:49628.service. Dec 13 15:52:46.837566 systemd[1]: sshd@5-147.75.203.63:22-139.178.89.65:49624.service: Deactivated successfully. Dec 13 15:52:46.840018 systemd-logind[1640]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:52:46.840020 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:52:46.841421 systemd-logind[1640]: Removed session 8. Dec 13 15:52:46.870494 sshd[1877]: Accepted publickey for core from 139.178.89.65 port 49628 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:46.871228 sshd[1877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:46.873988 systemd-logind[1640]: New session 9 of user core. Dec 13 15:52:46.874465 systemd[1]: Started session-9.scope. Dec 13 15:52:46.958144 sudo[1883]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:52:46.958852 sudo[1883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:52:46.978970 dbus-daemon[1600]: \xd0Mb \xdbU: received setenforce notice (enforcing=-1784483552) Dec 13 15:52:46.983596 sudo[1883]: pam_unix(sudo:session): session closed for user root Dec 13 15:52:46.988146 sshd[1877]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:46.994753 systemd[1]: Started sshd@7-147.75.203.63:22-139.178.89.65:49636.service. Dec 13 15:52:46.996409 systemd[1]: sshd@6-147.75.203.63:22-139.178.89.65:49628.service: Deactivated successfully. Dec 13 15:52:46.998798 systemd-logind[1640]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:52:46.998927 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:52:47.001418 systemd-logind[1640]: Removed session 9. Dec 13 15:52:47.057165 sshd[1885]: Accepted publickey for core from 139.178.89.65 port 49636 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:47.059543 sshd[1885]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:47.067329 systemd-logind[1640]: New session 10 of user core. Dec 13 15:52:47.068867 systemd[1]: Started session-10.scope. Dec 13 15:52:47.142518 sudo[1892]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:52:47.143540 sudo[1892]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:52:47.151078 sudo[1892]: pam_unix(sudo:session): session closed for user root Dec 13 15:52:47.163983 sudo[1891]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:52:47.164654 sudo[1891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:52:47.190003 systemd[1]: Stopping audit-rules.service... Dec 13 15:52:47.192000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:52:47.193860 auditctl[1895]: No rules Dec 13 15:52:47.194828 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:52:47.195400 systemd[1]: Stopped audit-rules.service. Dec 13 15:52:47.199386 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 15:52:47.199564 kernel: audit: type=1305 audit(1734105167.192:141): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:52:47.199518 systemd[1]: Starting audit-rules.service... Dec 13 15:52:47.192000 audit[1895]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5da60fc0 a2=420 a3=0 items=0 ppid=1 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.235498 augenrules[1913]: No rules Dec 13 15:52:47.236124 systemd[1]: Finished audit-rules.service. Dec 13 15:52:47.236965 sudo[1891]: pam_unix(sudo:session): session closed for user root Dec 13 15:52:47.238367 sshd[1885]: pam_unix(sshd:session): session closed for user core Dec 13 15:52:47.240754 systemd[1]: Started sshd@8-147.75.203.63:22-139.178.89.65:49650.service. Dec 13 15:52:47.241310 systemd[1]: sshd@7-147.75.203.63:22-139.178.89.65:49636.service: Deactivated successfully. Dec 13 15:52:47.242153 systemd-logind[1640]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:52:47.242187 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:52:47.243017 systemd-logind[1640]: Removed session 10. Dec 13 15:52:47.246629 kernel: audit: type=1300 audit(1734105167.192:141): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5da60fc0 a2=420 a3=0 items=0 ppid=1 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.246672 kernel: audit: type=1327 audit(1734105167.192:141): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:52:47.192000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:52:47.256182 kernel: audit: type=1131 audit(1734105167.194:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.278665 kernel: audit: type=1130 audit(1734105167.235:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.301156 kernel: audit: type=1106 audit(1734105167.236:144): pid=1891 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.236000 audit[1891]: USER_END pid=1891 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.303317 sshd[1918]: Accepted publickey for core from 139.178.89.65 port 49650 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:52:47.304818 sshd[1918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:52:47.307149 systemd-logind[1640]: New session 11 of user core. Dec 13 15:52:47.307528 systemd[1]: Started session-11.scope. Dec 13 15:52:47.327274 kernel: audit: type=1104 audit(1734105167.236:145): pid=1891 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.236000 audit[1891]: CRED_DISP pid=1891 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.350940 kernel: audit: type=1106 audit(1734105167.239:146): pid=1885 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.239000 audit[1885]: USER_END pid=1885 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.354833 sudo[1924]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:52:47.354955 sudo[1924]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:52:47.367362 systemd[1]: Starting docker.service... Dec 13 15:52:47.239000 audit[1885]: CRED_DISP pid=1885 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.383879 env[1938]: time="2024-12-13T15:52:47.383829796Z" level=info msg="Starting up" Dec 13 15:52:47.384512 env[1938]: time="2024-12-13T15:52:47.384475204Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:52:47.384512 env[1938]: time="2024-12-13T15:52:47.384484234Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:52:47.384512 env[1938]: time="2024-12-13T15:52:47.384499581Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:52:47.384512 env[1938]: time="2024-12-13T15:52:47.384505555Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:52:47.385341 env[1938]: time="2024-12-13T15:52:47.385307624Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:52:47.385341 env[1938]: time="2024-12-13T15:52:47.385314378Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:52:47.385341 env[1938]: time="2024-12-13T15:52:47.385320774Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:52:47.385341 env[1938]: time="2024-12-13T15:52:47.385326117Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:52:47.409090 kernel: audit: type=1104 audit(1734105167.239:147): pid=1885 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.409121 kernel: audit: type=1130 audit(1734105167.240:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.63:22-139.178.89.65:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.63:22-139.178.89.65:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.63:22-139.178.89.65:49636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.302000 audit[1918]: USER_ACCT pid=1918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.304000 audit[1918]: CRED_ACQ pid=1918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.304000 audit[1918]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f946f60 a2=3 a3=0 items=0 ppid=1 pid=1918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:52:47.308000 audit[1918]: USER_START pid=1918 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.308000 audit[1923]: CRED_ACQ pid=1923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:52:47.353000 audit[1924]: USER_ACCT pid=1924 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.353000 audit[1924]: CRED_REFR pid=1924 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.354000 audit[1924]: USER_START pid=1924 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.580962 env[1938]: time="2024-12-13T15:52:47.580871888Z" level=warning msg="Your kernel does not support cgroup blkio weight" Dec 13 15:52:47.580962 env[1938]: time="2024-12-13T15:52:47.580911034Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Dec 13 15:52:47.581308 env[1938]: time="2024-12-13T15:52:47.581231575Z" level=info msg="Loading containers: start." Dec 13 15:52:47.632000 audit[1980]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.632000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe1e5a8cb0 a2=0 a3=7ffe1e5a8c9c items=0 ppid=1938 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 15:52:47.633000 audit[1982]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.633000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff0707d1c0 a2=0 a3=7fff0707d1ac items=0 ppid=1938 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 15:52:47.634000 audit[1984]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.634000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeae2ca8a0 a2=0 a3=7ffeae2ca88c items=0 ppid=1938 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:52:47.635000 audit[1986]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.635000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdd8463980 a2=0 a3=7ffdd846396c items=0 ppid=1938 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:52:47.636000 audit[1988]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.636000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc55e467d0 a2=0 a3=7ffc55e467bc items=0 ppid=1938 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 15:52:47.655000 audit[1993]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.655000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd78eac020 a2=0 a3=7ffd78eac00c items=0 ppid=1938 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 15:52:47.658000 audit[1995]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.658000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffedc91bf70 a2=0 a3=7ffedc91bf5c items=0 ppid=1938 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 15:52:47.659000 audit[1997]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.659000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe473fcbf0 a2=0 a3=7ffe473fcbdc items=0 ppid=1938 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 15:52:47.660000 audit[1999]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.660000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffd5054250 a2=0 a3=7fffd505423c items=0 ppid=1938 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:52:47.664000 audit[2003]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.664000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe824eece0 a2=0 a3=7ffe824eeccc items=0 ppid=1938 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:52:47.677000 audit[2004]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.677000 audit[2004]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd64f172c0 a2=0 a3=7ffd64f172ac items=0 ppid=1938 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:52:47.692551 kernel: Initializing XFRM netlink socket Dec 13 15:52:47.741296 env[1938]: time="2024-12-13T15:52:47.741246152Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 15:52:47.760000 audit[2012]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.760000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffff067080 a2=0 a3=7fffff06706c items=0 ppid=1938 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 15:52:47.778000 audit[2015]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.778000 audit[2015]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeb576e240 a2=0 a3=7ffeb576e22c items=0 ppid=1938 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 15:52:47.782000 audit[2018]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.782000 audit[2018]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff925f9470 a2=0 a3=7fff925f945c items=0 ppid=1938 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 15:52:47.784000 audit[2020]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.784000 audit[2020]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff30cf5260 a2=0 a3=7fff30cf524c items=0 ppid=1938 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 15:52:47.787000 audit[2022]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.787000 audit[2022]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff7a17c110 a2=0 a3=7fff7a17c0fc items=0 ppid=1938 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 15:52:47.791000 audit[2024]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2024 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.791000 audit[2024]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff86057190 a2=0 a3=7fff8605717c items=0 ppid=1938 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 15:52:47.794000 audit[2026]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2026 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.794000 audit[2026]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffde2d8eb40 a2=0 a3=7ffde2d8eb2c items=0 ppid=1938 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 15:52:47.809000 audit[2029]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.809000 audit[2029]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdbb743440 a2=0 a3=7ffdbb74342c items=0 ppid=1938 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 15:52:47.812000 audit[2031]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.812000 audit[2031]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffe6124190 a2=0 a3=7fffe612417c items=0 ppid=1938 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.812000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:52:47.815000 audit[2033]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.815000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff17324c60 a2=0 a3=7fff17324c4c items=0 ppid=1938 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.815000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:52:47.819000 audit[2035]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.819000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8875a2c0 a2=0 a3=7ffc8875a2ac items=0 ppid=1938 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 15:52:47.820394 systemd-networkd[1392]: docker0: Link UP Dec 13 15:52:47.829000 audit[2039]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.829000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce7f37cc0 a2=0 a3=7ffce7f37cac items=0 ppid=1938 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:52:47.847000 audit[2040]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:52:47.847000 audit[2040]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc9d682d30 a2=0 a3=7ffc9d682d1c items=0 ppid=1938 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:47.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:52:47.849039 env[1938]: time="2024-12-13T15:52:47.848915368Z" level=info msg="Loading containers: done." Dec 13 15:52:47.868968 env[1938]: time="2024-12-13T15:52:47.868925052Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 15:52:47.869035 env[1938]: time="2024-12-13T15:52:47.869004597Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 15:52:47.869057 env[1938]: time="2024-12-13T15:52:47.869049572Z" level=info msg="Daemon has completed initialization" Dec 13 15:52:47.874905 systemd[1]: Started docker.service. Dec 13 15:52:47.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:47.877970 env[1938]: time="2024-12-13T15:52:47.877947012Z" level=info msg="API listen on /run/docker.sock" Dec 13 15:52:49.140253 env[1651]: time="2024-12-13T15:52:49.140164389Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 15:52:49.865322 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1139541480.mount: Deactivated successfully. Dec 13 15:52:51.691645 env[1651]: time="2024-12-13T15:52:51.691594031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:51.692287 env[1651]: time="2024-12-13T15:52:51.692243025Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:51.693495 env[1651]: time="2024-12-13T15:52:51.693454151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:51.694547 env[1651]: time="2024-12-13T15:52:51.694496393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:51.695055 env[1651]: time="2024-12-13T15:52:51.695004169Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 15:52:51.700400 env[1651]: time="2024-12-13T15:52:51.700386453Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 15:52:52.207075 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:52:52.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.207638 systemd[1]: Stopped kubelet.service. Dec 13 15:52:52.211207 systemd[1]: Starting kubelet.service... Dec 13 15:52:52.213375 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 15:52:52.213410 kernel: audit: type=1130 audit(1734105172.206:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.290827 kernel: audit: type=1131 audit(1734105172.206:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.389443 systemd[1]: Started kubelet.service. Dec 13 15:52:52.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.416870 kubelet[2108]: E1213 15:52:52.416821 2108 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:52:52.418072 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:52:52.418154 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:52:52.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:52:52.503732 kernel: audit: type=1130 audit(1734105172.388:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:52:52.503768 kernel: audit: type=1131 audit(1734105172.416:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:52:53.744202 env[1651]: time="2024-12-13T15:52:53.744176236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:53.744792 env[1651]: time="2024-12-13T15:52:53.744780719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:53.745784 env[1651]: time="2024-12-13T15:52:53.745739390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:53.746745 env[1651]: time="2024-12-13T15:52:53.746689987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:53.747191 env[1651]: time="2024-12-13T15:52:53.747151443Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 15:52:53.754248 env[1651]: time="2024-12-13T15:52:53.754217721Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 15:52:54.943285 env[1651]: time="2024-12-13T15:52:54.943258454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:54.944042 env[1651]: time="2024-12-13T15:52:54.944028637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:54.945068 env[1651]: time="2024-12-13T15:52:54.945056290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:54.946230 env[1651]: time="2024-12-13T15:52:54.946218256Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:54.946711 env[1651]: time="2024-12-13T15:52:54.946696515Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 15:52:54.954090 env[1651]: time="2024-12-13T15:52:54.954059607Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 15:52:55.831775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3909790460.mount: Deactivated successfully. Dec 13 15:52:56.258957 env[1651]: time="2024-12-13T15:52:56.258911563Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:56.259456 env[1651]: time="2024-12-13T15:52:56.259417731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:56.260169 env[1651]: time="2024-12-13T15:52:56.260133687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:56.260898 env[1651]: time="2024-12-13T15:52:56.260854541Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:56.261203 env[1651]: time="2024-12-13T15:52:56.261161470Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 15:52:56.266974 env[1651]: time="2024-12-13T15:52:56.266941099Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 15:52:56.781028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount925760569.mount: Deactivated successfully. Dec 13 15:52:57.436267 env[1651]: time="2024-12-13T15:52:57.436215050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.436925 env[1651]: time="2024-12-13T15:52:57.436895058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.438401 env[1651]: time="2024-12-13T15:52:57.438359377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.439292 env[1651]: time="2024-12-13T15:52:57.439239203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.439791 env[1651]: time="2024-12-13T15:52:57.439734553Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 15:52:57.446319 env[1651]: time="2024-12-13T15:52:57.446306095Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 15:52:57.899647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3949169189.mount: Deactivated successfully. Dec 13 15:52:57.900658 env[1651]: time="2024-12-13T15:52:57.900639800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.901189 env[1651]: time="2024-12-13T15:52:57.901177209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.901822 env[1651]: time="2024-12-13T15:52:57.901808457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.902548 env[1651]: time="2024-12-13T15:52:57.902536343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:57.902827 env[1651]: time="2024-12-13T15:52:57.902798718Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 15:52:57.908030 env[1651]: time="2024-12-13T15:52:57.908015736Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 15:52:58.462933 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2842916115.mount: Deactivated successfully. Dec 13 15:53:00.624242 env[1651]: time="2024-12-13T15:53:00.624181808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:00.624842 env[1651]: time="2024-12-13T15:53:00.624803221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:00.626149 env[1651]: time="2024-12-13T15:53:00.626114143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:00.627806 env[1651]: time="2024-12-13T15:53:00.627761830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:00.628333 env[1651]: time="2024-12-13T15:53:00.628293020Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 15:53:02.455861 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:53:02.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:02.455976 systemd[1]: Stopped kubelet.service. Dec 13 15:53:02.456875 systemd[1]: Starting kubelet.service... Dec 13 15:53:02.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:02.575868 kernel: audit: type=1130 audit(1734105182.455:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:02.575937 kernel: audit: type=1131 audit(1734105182.455:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:02.596039 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 15:53:02.596080 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 15:53:02.596224 systemd[1]: Stopped kubelet.service. Dec 13 15:53:02.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:53:02.597445 systemd[1]: Starting kubelet.service... Dec 13 15:53:02.606570 systemd[1]: Reloading. Dec 13 15:53:02.635914 /usr/lib/systemd/system-generators/torcx-generator[2310]: time="2024-12-13T15:53:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:53:02.635940 /usr/lib/systemd/system-generators/torcx-generator[2310]: time="2024-12-13T15:53:02Z" level=info msg="torcx already run" Dec 13 15:53:02.658541 kernel: audit: type=1130 audit(1734105182.595:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:53:02.693430 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:53:02.693438 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:53:02.705922 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:53:02.757769 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 15:53:02.757805 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 15:53:02.757932 systemd[1]: Stopped kubelet.service. Dec 13 15:53:02.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:53:02.758826 systemd[1]: Starting kubelet.service... Dec 13 15:53:02.822677 kernel: audit: type=1130 audit(1734105182.757:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:53:02.961352 systemd[1]: Started kubelet.service. Dec 13 15:53:02.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:02.986568 kubelet[2388]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:53:02.986568 kubelet[2388]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:53:02.986568 kubelet[2388]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:53:02.986568 kubelet[2388]: I1213 15:53:02.986531 2388 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:53:03.027566 kernel: audit: type=1130 audit(1734105182.960:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:03.194655 kubelet[2388]: I1213 15:53:03.194615 2388 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:53:03.194655 kubelet[2388]: I1213 15:53:03.194628 2388 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:53:03.194763 kubelet[2388]: I1213 15:53:03.194727 2388 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:53:03.208441 kubelet[2388]: E1213 15:53:03.208402 2388 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.203.63:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.209217 kubelet[2388]: I1213 15:53:03.209177 2388 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:53:03.232913 kubelet[2388]: I1213 15:53:03.232854 2388 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:53:03.233116 kubelet[2388]: I1213 15:53:03.233081 2388 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:53:03.233239 kubelet[2388]: I1213 15:53:03.233205 2388 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:53:03.233693 kubelet[2388]: I1213 15:53:03.233659 2388 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:53:03.233693 kubelet[2388]: I1213 15:53:03.233668 2388 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:53:03.235237 kubelet[2388]: I1213 15:53:03.235192 2388 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:53:03.235268 kubelet[2388]: I1213 15:53:03.235242 2388 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:53:03.235268 kubelet[2388]: I1213 15:53:03.235251 2388 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:53:03.235268 kubelet[2388]: I1213 15:53:03.235264 2388 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:53:03.235328 kubelet[2388]: I1213 15:53:03.235270 2388 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:53:03.238328 kubelet[2388]: I1213 15:53:03.238306 2388 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:53:03.241850 kubelet[2388]: W1213 15:53:03.241790 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.75.203.63:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.241850 kubelet[2388]: E1213 15:53:03.241830 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.63:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.242349 kubelet[2388]: W1213 15:53:03.242300 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.75.203.63:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-e7c4cc3cdd&limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.242349 kubelet[2388]: E1213 15:53:03.242326 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.63:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-e7c4cc3cdd&limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.244878 kubelet[2388]: I1213 15:53:03.244839 2388 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:53:03.246055 kubelet[2388]: W1213 15:53:03.246018 2388 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:53:03.246363 kubelet[2388]: I1213 15:53:03.246318 2388 server.go:1256] "Started kubelet" Dec 13 15:53:03.246363 kubelet[2388]: I1213 15:53:03.246355 2388 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:53:03.246438 kubelet[2388]: I1213 15:53:03.246403 2388 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:53:03.246638 kubelet[2388]: I1213 15:53:03.246582 2388 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:53:03.245000 audit[2388]: AVC avc: denied { mac_admin } for pid=2388 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:03.247004 kubelet[2388]: I1213 15:53:03.246922 2388 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:53:03.247004 kubelet[2388]: I1213 15:53:03.246943 2388 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:53:03.247004 kubelet[2388]: I1213 15:53:03.246977 2388 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:53:03.247133 kubelet[2388]: I1213 15:53:03.247038 2388 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:53:03.247133 kubelet[2388]: I1213 15:53:03.247051 2388 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:53:03.247133 kubelet[2388]: I1213 15:53:03.247077 2388 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:53:03.247133 kubelet[2388]: I1213 15:53:03.247110 2388 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:53:03.247278 kubelet[2388]: E1213 15:53:03.247231 2388 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.63:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-e7c4cc3cdd?timeout=10s\": dial tcp 147.75.203.63:6443: connect: connection refused" interval="200ms" Dec 13 15:53:03.247278 kubelet[2388]: W1213 15:53:03.247251 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.75.203.63:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.247347 kubelet[2388]: E1213 15:53:03.247286 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.63:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.258674 kubelet[2388]: E1213 15:53:03.258663 2388 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:53:03.260996 kubelet[2388]: I1213 15:53:03.260982 2388 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:53:03.261054 kubelet[2388]: I1213 15:53:03.261029 2388 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:53:03.261465 kubelet[2388]: I1213 15:53:03.261453 2388 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:53:03.263934 kubelet[2388]: E1213 15:53:03.263921 2388 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.203.63:6443/api/v1/namespaces/default/events\": dial tcp 147.75.203.63:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-e7c4cc3cdd.1810c779fa8f44bf default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-e7c4cc3cdd,UID:ci-3510.3.6-a-e7c4cc3cdd,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-e7c4cc3cdd,},FirstTimestamp:2024-12-13 15:53:03.246304447 +0000 UTC m=+0.282984131,LastTimestamp:2024-12-13 15:53:03.246304447 +0000 UTC m=+0.282984131,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-e7c4cc3cdd,}" Dec 13 15:53:03.245000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:03.332604 kubelet[2388]: I1213 15:53:03.332585 2388 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:53:03.332604 kubelet[2388]: I1213 15:53:03.332597 2388 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:53:03.332604 kubelet[2388]: I1213 15:53:03.332606 2388 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:53:03.336549 kubelet[2388]: I1213 15:53:03.336532 2388 policy_none.go:49] "None policy: Start" Dec 13 15:53:03.336789 kubelet[2388]: I1213 15:53:03.336774 2388 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:53:03.336789 kubelet[2388]: I1213 15:53:03.336786 2388 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:53:03.344171 kernel: audit: type=1400 audit(1734105183.245:192): avc: denied { mac_admin } for pid=2388 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:03.344212 kernel: audit: type=1401 audit(1734105183.245:192): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:03.344278 kernel: audit: type=1300 audit(1734105183.245:192): arch=c000003e syscall=188 success=no exit=-22 a0=c000d18c30 a1=c000e1fd58 a2=c000d18c00 a3=25 items=0 ppid=1 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.245000 audit[2388]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d18c30 a1=c000e1fd58 a2=c000d18c00 a3=25 items=0 ppid=1 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.348147 kubelet[2388]: I1213 15:53:03.348135 2388 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.348326 kubelet[2388]: E1213 15:53:03.348316 2388 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.63:6443/api/v1/nodes\": dial tcp 147.75.203.63:6443: connect: connection refused" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.245000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:03.447617 kubelet[2388]: E1213 15:53:03.447605 2388 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.63:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-e7c4cc3cdd?timeout=10s\": dial tcp 147.75.203.63:6443: connect: connection refused" interval="400ms" Dec 13 15:53:03.532455 kernel: audit: type=1327 audit(1734105183.245:192): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:03.532523 kernel: audit: type=1400 audit(1734105183.245:193): avc: denied { mac_admin } for pid=2388 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:03.245000 audit[2388]: AVC avc: denied { mac_admin } for pid=2388 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:03.533903 kubelet[2388]: I1213 15:53:03.533893 2388 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:53:03.533959 kubelet[2388]: I1213 15:53:03.533931 2388 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:53:03.534038 kubelet[2388]: I1213 15:53:03.534029 2388 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:53:03.534463 kubelet[2388]: E1213 15:53:03.534453 2388 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:03.549357 kubelet[2388]: I1213 15:53:03.549348 2388 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.549470 kubelet[2388]: E1213 15:53:03.549462 2388 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.63:6443/api/v1/nodes\": dial tcp 147.75.203.63:6443: connect: connection refused" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.245000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:03.245000 audit[2388]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e0e720 a1=c000e1fd70 a2=c000d18cc0 a3=25 items=0 ppid=1 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.245000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:03.247000 audit[2412]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.247000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff32ce9440 a2=0 a3=7fff32ce942c items=0 ppid=2388 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:53:03.247000 audit[2413]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.247000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0d81f270 a2=0 a3=7fff0d81f25c items=0 ppid=2388 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:53:03.248000 audit[2415]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.248000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2d618210 a2=0 a3=7ffe2d6181fc items=0 ppid=2388 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:53:03.250000 audit[2417]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.250000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcbaf54dd0 a2=0 a3=7ffcbaf54dbc items=0 ppid=2388 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:53:03.532000 audit[2388]: AVC avc: denied { mac_admin } for pid=2388 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:03.532000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:03.532000 audit[2388]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eafd70 a1=c000f51038 a2=c000eafd40 a3=25 items=0 ppid=1 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:03.596000 audit[2422]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.596000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe63c5cb70 a2=0 a3=7ffe63c5cb5c items=0 ppid=2388 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:53:03.598063 kubelet[2388]: I1213 15:53:03.598024 2388 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:53:03.596000 audit[2424]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:03.596000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff52795320 a2=0 a3=7fff5279530c items=0 ppid=2388 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:53:03.597000 audit[2425]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.597000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeed2e7260 a2=0 a3=7ffeed2e724c items=0 ppid=2388 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:53:03.598693 kubelet[2388]: I1213 15:53:03.598581 2388 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:53:03.598693 kubelet[2388]: I1213 15:53:03.598593 2388 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:53:03.598693 kubelet[2388]: I1213 15:53:03.598604 2388 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:53:03.598693 kubelet[2388]: E1213 15:53:03.598628 2388 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 15:53:03.598901 kubelet[2388]: W1213 15:53:03.598830 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://147.75.203.63:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.598901 kubelet[2388]: E1213 15:53:03.598859 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.63:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:03.597000 audit[2426]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:03.597000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddbb3d710 a2=0 a3=7ffddbb3d6fc items=0 ppid=2388 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:53:03.597000 audit[2427]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.597000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1e9b0660 a2=0 a3=7fff1e9b064c items=0 ppid=2388 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:53:03.598000 audit[2428]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:03.598000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd918048f0 a2=0 a3=7ffd918048dc items=0 ppid=2388 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:53:03.598000 audit[2429]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:03.598000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce9515820 a2=0 a3=7ffce951580c items=0 ppid=2388 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:53:03.598000 audit[2430]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:03.598000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd247801f0 a2=0 a3=7ffd247801dc items=0 ppid=2388 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:03.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:53:03.699340 kubelet[2388]: I1213 15:53:03.699277 2388 topology_manager.go:215] "Topology Admit Handler" podUID="20199668d7fc24f0e559748a092a0871" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.701253 kubelet[2388]: I1213 15:53:03.701201 2388 topology_manager.go:215] "Topology Admit Handler" podUID="27b0676f31ff25af91d3a114fd047144" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.702923 kubelet[2388]: I1213 15:53:03.702898 2388 topology_manager.go:215] "Topology Admit Handler" podUID="b5ea6efab99067595fea2183216e71d9" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.848606 kubelet[2388]: I1213 15:53:03.848352 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.848606 kubelet[2388]: I1213 15:53:03.848471 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.848606 kubelet[2388]: I1213 15:53:03.848608 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849115 kubelet[2388]: I1213 15:53:03.848688 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849115 kubelet[2388]: E1213 15:53:03.848699 2388 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.63:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-e7c4cc3cdd?timeout=10s\": dial tcp 147.75.203.63:6443: connect: connection refused" interval="800ms" Dec 13 15:53:03.849115 kubelet[2388]: I1213 15:53:03.848772 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849115 kubelet[2388]: I1213 15:53:03.848868 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849115 kubelet[2388]: I1213 15:53:03.848944 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849691 kubelet[2388]: I1213 15:53:03.849017 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.849691 kubelet[2388]: I1213 15:53:03.849127 2388 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b5ea6efab99067595fea2183216e71d9-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"b5ea6efab99067595fea2183216e71d9\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.954220 kubelet[2388]: I1213 15:53:03.954151 2388 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:03.955090 kubelet[2388]: E1213 15:53:03.954997 2388 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.63:6443/api/v1/nodes\": dial tcp 147.75.203.63:6443: connect: connection refused" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:04.007763 env[1651]: time="2024-12-13T15:53:04.007621465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd,Uid:20199668d7fc24f0e559748a092a0871,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:04.009665 env[1651]: time="2024-12-13T15:53:04.009577164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd,Uid:27b0676f31ff25af91d3a114fd047144,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:04.010556 env[1651]: time="2024-12-13T15:53:04.010419547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd,Uid:b5ea6efab99067595fea2183216e71d9,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:04.080526 kubelet[2388]: W1213 15:53:04.080335 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.75.203.63:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.080526 kubelet[2388]: E1213 15:53:04.080504 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.63:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.134685 kubelet[2388]: W1213 15:53:04.134400 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.75.203.63:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-e7c4cc3cdd&limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.134685 kubelet[2388]: E1213 15:53:04.134587 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.63:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-e7c4cc3cdd&limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.541889 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3434348178.mount: Deactivated successfully. Dec 13 15:53:04.543188 env[1651]: time="2024-12-13T15:53:04.543142654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.544423 env[1651]: time="2024-12-13T15:53:04.544408852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.545215 env[1651]: time="2024-12-13T15:53:04.545199039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.545841 env[1651]: time="2024-12-13T15:53:04.545829146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.546226 env[1651]: time="2024-12-13T15:53:04.546214796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.547336 env[1651]: time="2024-12-13T15:53:04.547291656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.548536 env[1651]: time="2024-12-13T15:53:04.548520406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.550227 env[1651]: time="2024-12-13T15:53:04.550204122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.551081 env[1651]: time="2024-12-13T15:53:04.551067703Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.551453 env[1651]: time="2024-12-13T15:53:04.551441899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.551848 env[1651]: time="2024-12-13T15:53:04.551836915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.552250 env[1651]: time="2024-12-13T15:53:04.552214672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:04.556052 env[1651]: time="2024-12-13T15:53:04.556005167Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:04.556052 env[1651]: time="2024-12-13T15:53:04.556030900Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:04.556052 env[1651]: time="2024-12-13T15:53:04.556037994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:04.556282 env[1651]: time="2024-12-13T15:53:04.556128034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f3da9cd9a70239b5a16b9c49d4ed3f2a1063d533bda2b57446596e8d8a5b9bd pid=2439 runtime=io.containerd.runc.v2 Dec 13 15:53:04.557099 env[1651]: time="2024-12-13T15:53:04.557067663Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:04.557099 env[1651]: time="2024-12-13T15:53:04.557091333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:04.557159 env[1651]: time="2024-12-13T15:53:04.557103661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:04.557231 env[1651]: time="2024-12-13T15:53:04.557203941Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5964f90da171b8c75299dbba650e7b48207a333a8a21b4a5f62d002feba6ed9 pid=2456 runtime=io.containerd.runc.v2 Dec 13 15:53:04.557840 env[1651]: time="2024-12-13T15:53:04.557792270Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:04.557840 env[1651]: time="2024-12-13T15:53:04.557809500Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:04.557840 env[1651]: time="2024-12-13T15:53:04.557816530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:04.557924 env[1651]: time="2024-12-13T15:53:04.557881529Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/817155599f309c9d097f3760d03e6f66656ec86cc7322979b90d85257a3b2e4e pid=2467 runtime=io.containerd.runc.v2 Dec 13 15:53:04.590417 env[1651]: time="2024-12-13T15:53:04.590374827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd,Uid:b5ea6efab99067595fea2183216e71d9,Namespace:kube-system,Attempt:0,} returns sandbox id \"c5964f90da171b8c75299dbba650e7b48207a333a8a21b4a5f62d002feba6ed9\"" Dec 13 15:53:04.590417 env[1651]: time="2024-12-13T15:53:04.590406681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd,Uid:27b0676f31ff25af91d3a114fd047144,Namespace:kube-system,Attempt:0,} returns sandbox id \"817155599f309c9d097f3760d03e6f66656ec86cc7322979b90d85257a3b2e4e\"" Dec 13 15:53:04.590628 env[1651]: time="2024-12-13T15:53:04.590447737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd,Uid:20199668d7fc24f0e559748a092a0871,Namespace:kube-system,Attempt:0,} returns sandbox id \"9f3da9cd9a70239b5a16b9c49d4ed3f2a1063d533bda2b57446596e8d8a5b9bd\"" Dec 13 15:53:04.593050 env[1651]: time="2024-12-13T15:53:04.593032899Z" level=info msg="CreateContainer within sandbox \"9f3da9cd9a70239b5a16b9c49d4ed3f2a1063d533bda2b57446596e8d8a5b9bd\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 15:53:04.593050 env[1651]: time="2024-12-13T15:53:04.593033115Z" level=info msg="CreateContainer within sandbox \"c5964f90da171b8c75299dbba650e7b48207a333a8a21b4a5f62d002feba6ed9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 15:53:04.593121 env[1651]: time="2024-12-13T15:53:04.593105859Z" level=info msg="CreateContainer within sandbox \"817155599f309c9d097f3760d03e6f66656ec86cc7322979b90d85257a3b2e4e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 15:53:04.600141 env[1651]: time="2024-12-13T15:53:04.600122417Z" level=info msg="CreateContainer within sandbox \"c5964f90da171b8c75299dbba650e7b48207a333a8a21b4a5f62d002feba6ed9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ce19d638ca4434c9f7b46218dee559b3d26b1c51e17d8aecd62232f56b22ae82\"" Dec 13 15:53:04.600329 env[1651]: time="2024-12-13T15:53:04.600317043Z" level=info msg="StartContainer for \"ce19d638ca4434c9f7b46218dee559b3d26b1c51e17d8aecd62232f56b22ae82\"" Dec 13 15:53:04.601442 env[1651]: time="2024-12-13T15:53:04.601424835Z" level=info msg="CreateContainer within sandbox \"817155599f309c9d097f3760d03e6f66656ec86cc7322979b90d85257a3b2e4e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e5b00c0fe4a959ffbd8fed96197dc712c74b50724060dea6b39377afdf0089ff\"" Dec 13 15:53:04.601596 env[1651]: time="2024-12-13T15:53:04.601583709Z" level=info msg="StartContainer for \"e5b00c0fe4a959ffbd8fed96197dc712c74b50724060dea6b39377afdf0089ff\"" Dec 13 15:53:04.601778 env[1651]: time="2024-12-13T15:53:04.601765163Z" level=info msg="CreateContainer within sandbox \"9f3da9cd9a70239b5a16b9c49d4ed3f2a1063d533bda2b57446596e8d8a5b9bd\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"10592871815413eb87ddb9ded1101226f1b78572ebfeff81d01358d921f98106\"" Dec 13 15:53:04.601924 env[1651]: time="2024-12-13T15:53:04.601909240Z" level=info msg="StartContainer for \"10592871815413eb87ddb9ded1101226f1b78572ebfeff81d01358d921f98106\"" Dec 13 15:53:04.636841 env[1651]: time="2024-12-13T15:53:04.636794212Z" level=info msg="StartContainer for \"ce19d638ca4434c9f7b46218dee559b3d26b1c51e17d8aecd62232f56b22ae82\" returns successfully" Dec 13 15:53:04.637089 env[1651]: time="2024-12-13T15:53:04.636865810Z" level=info msg="StartContainer for \"10592871815413eb87ddb9ded1101226f1b78572ebfeff81d01358d921f98106\" returns successfully" Dec 13 15:53:04.637089 env[1651]: time="2024-12-13T15:53:04.636901311Z" level=info msg="StartContainer for \"e5b00c0fe4a959ffbd8fed96197dc712c74b50724060dea6b39377afdf0089ff\" returns successfully" Dec 13 15:53:04.649068 kubelet[2388]: E1213 15:53:04.649016 2388 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.63:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-e7c4cc3cdd?timeout=10s\": dial tcp 147.75.203.63:6443: connect: connection refused" interval="1.6s" Dec 13 15:53:04.659593 kubelet[2388]: W1213 15:53:04.659550 2388 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://147.75.203.63:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.659593 kubelet[2388]: E1213 15:53:04.659593 2388 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.63:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.63:6443: connect: connection refused Dec 13 15:53:04.756443 kubelet[2388]: I1213 15:53:04.756428 2388 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:05.175794 kubelet[2388]: I1213 15:53:05.175774 2388 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:05.182493 kubelet[2388]: E1213 15:53:05.182449 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.283539 kubelet[2388]: E1213 15:53:05.283516 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.384128 kubelet[2388]: E1213 15:53:05.384105 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.485384 kubelet[2388]: E1213 15:53:05.485323 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.585743 kubelet[2388]: E1213 15:53:05.585680 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.686425 kubelet[2388]: E1213 15:53:05.686361 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.787068 kubelet[2388]: E1213 15:53:05.786913 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.887997 kubelet[2388]: E1213 15:53:05.887912 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:05.988520 kubelet[2388]: E1213 15:53:05.988416 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.089847 kubelet[2388]: E1213 15:53:06.089631 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.190770 kubelet[2388]: E1213 15:53:06.190669 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.291566 kubelet[2388]: E1213 15:53:06.291504 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.392749 kubelet[2388]: E1213 15:53:06.392581 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.493611 kubelet[2388]: E1213 15:53:06.493508 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.593718 kubelet[2388]: E1213 15:53:06.593644 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:06.694523 kubelet[2388]: E1213 15:53:06.694324 2388 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-e7c4cc3cdd\" not found" Dec 13 15:53:07.238568 kubelet[2388]: I1213 15:53:07.238448 2388 apiserver.go:52] "Watching apiserver" Dec 13 15:53:07.247625 kubelet[2388]: I1213 15:53:07.247530 2388 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:53:07.636205 kubelet[2388]: W1213 15:53:07.635578 2388 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:53:08.602149 systemd[1]: Reloading. Dec 13 15:53:08.650299 /usr/lib/systemd/system-generators/torcx-generator[2715]: time="2024-12-13T15:53:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:53:08.650317 /usr/lib/systemd/system-generators/torcx-generator[2715]: time="2024-12-13T15:53:08Z" level=info msg="torcx already run" Dec 13 15:53:08.708256 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:53:08.708264 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:53:08.720611 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:53:08.776021 systemd[1]: Stopping kubelet.service... Dec 13 15:53:08.776147 kubelet[2388]: I1213 15:53:08.776058 2388 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:53:08.790441 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:53:08.791088 systemd[1]: Stopped kubelet.service. Dec 13 15:53:08.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:08.795141 systemd[1]: Starting kubelet.service... Dec 13 15:53:08.817776 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 15:53:08.817839 kernel: audit: type=1131 audit(1734105188.789:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:08.989624 systemd[1]: Started kubelet.service. Dec 13 15:53:08.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:09.024883 kubelet[2787]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:53:09.024883 kubelet[2787]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:53:09.024883 kubelet[2787]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:53:09.025316 kubelet[2787]: I1213 15:53:09.024903 2787 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:53:09.027606 kubelet[2787]: I1213 15:53:09.027595 2787 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:53:09.027606 kubelet[2787]: I1213 15:53:09.027606 2787 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:53:09.027705 kubelet[2787]: I1213 15:53:09.027698 2787 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:53:09.028477 kubelet[2787]: I1213 15:53:09.028471 2787 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 15:53:09.029453 kubelet[2787]: I1213 15:53:09.029443 2787 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:53:09.055519 kernel: audit: type=1130 audit(1734105188.989:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:09.061491 kubelet[2787]: I1213 15:53:09.061450 2787 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:53:09.061903 kubelet[2787]: I1213 15:53:09.061854 2787 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:53:09.062008 kubelet[2787]: I1213 15:53:09.061963 2787 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:53:09.062008 kubelet[2787]: I1213 15:53:09.061979 2787 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:53:09.062008 kubelet[2787]: I1213 15:53:09.061986 2787 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:53:09.062008 kubelet[2787]: I1213 15:53:09.062003 2787 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:53:09.062184 kubelet[2787]: I1213 15:53:09.062051 2787 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:53:09.062184 kubelet[2787]: I1213 15:53:09.062061 2787 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:53:09.062184 kubelet[2787]: I1213 15:53:09.062074 2787 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:53:09.062184 kubelet[2787]: I1213 15:53:09.062082 2787 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:53:09.062567 kubelet[2787]: I1213 15:53:09.062539 2787 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:53:09.062730 kubelet[2787]: I1213 15:53:09.062699 2787 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:53:09.063044 kubelet[2787]: I1213 15:53:09.062991 2787 server.go:1256] "Started kubelet" Dec 13 15:53:09.063092 kubelet[2787]: I1213 15:53:09.063047 2787 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:53:09.063124 kubelet[2787]: I1213 15:53:09.063095 2787 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:53:09.063559 kubelet[2787]: I1213 15:53:09.063547 2787 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:53:09.062000 audit[2787]: AVC avc: denied { mac_admin } for pid=2787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:09.064012 kubelet[2787]: I1213 15:53:09.063919 2787 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:53:09.064012 kubelet[2787]: I1213 15:53:09.063946 2787 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:53:09.064012 kubelet[2787]: I1213 15:53:09.063965 2787 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:53:09.064111 kubelet[2787]: I1213 15:53:09.064024 2787 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:53:09.064111 kubelet[2787]: I1213 15:53:09.064086 2787 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:53:09.064527 kubelet[2787]: I1213 15:53:09.064513 2787 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:53:09.064653 kubelet[2787]: I1213 15:53:09.064641 2787 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:53:09.064838 kubelet[2787]: E1213 15:53:09.064827 2787 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:53:09.064886 kubelet[2787]: I1213 15:53:09.064863 2787 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:53:09.064964 kubelet[2787]: I1213 15:53:09.064944 2787 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:53:09.068951 kubelet[2787]: I1213 15:53:09.068925 2787 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:53:09.069317 kubelet[2787]: I1213 15:53:09.069307 2787 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:53:09.069534 kubelet[2787]: I1213 15:53:09.069525 2787 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:53:09.069571 kubelet[2787]: I1213 15:53:09.069542 2787 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:53:09.069571 kubelet[2787]: I1213 15:53:09.069556 2787 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:53:09.069628 kubelet[2787]: E1213 15:53:09.069601 2787 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:53:09.087535 kubelet[2787]: I1213 15:53:09.087512 2787 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:53:09.087535 kubelet[2787]: I1213 15:53:09.087526 2787 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:53:09.087535 kubelet[2787]: I1213 15:53:09.087535 2787 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:53:09.087650 kubelet[2787]: I1213 15:53:09.087625 2787 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 15:53:09.087650 kubelet[2787]: I1213 15:53:09.087640 2787 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 15:53:09.087650 kubelet[2787]: I1213 15:53:09.087644 2787 policy_none.go:49] "None policy: Start" Dec 13 15:53:09.088029 kubelet[2787]: I1213 15:53:09.087993 2787 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:53:09.088029 kubelet[2787]: I1213 15:53:09.088006 2787 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:53:09.088090 kubelet[2787]: I1213 15:53:09.088080 2787 state_mem.go:75] "Updated machine memory state" Dec 13 15:53:09.088691 kubelet[2787]: I1213 15:53:09.088652 2787 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:53:09.088691 kubelet[2787]: I1213 15:53:09.088683 2787 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:53:09.088826 kubelet[2787]: I1213 15:53:09.088817 2787 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:53:09.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:09.160680 kernel: audit: type=1400 audit(1734105189.062:209): avc: denied { mac_admin } for pid=2787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:09.160729 kernel: audit: type=1401 audit(1734105189.062:209): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:09.160744 kernel: audit: type=1300 audit(1734105189.062:209): arch=c000003e syscall=188 success=no exit=-22 a0=c000efa2d0 a1=c00074dd40 a2=c000efa2a0 a3=25 items=0 ppid=1 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:09.062000 audit[2787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000efa2d0 a1=c00074dd40 a2=c000efa2a0 a3=25 items=0 ppid=1 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:09.166426 kubelet[2787]: I1213 15:53:09.166413 2787 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.170097 kubelet[2787]: I1213 15:53:09.170060 2787 topology_manager.go:215] "Topology Admit Handler" podUID="27b0676f31ff25af91d3a114fd047144" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.170149 kubelet[2787]: I1213 15:53:09.170104 2787 topology_manager.go:215] "Topology Admit Handler" podUID="b5ea6efab99067595fea2183216e71d9" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.170149 kubelet[2787]: I1213 15:53:09.170124 2787 topology_manager.go:215] "Topology Admit Handler" podUID="20199668d7fc24f0e559748a092a0871" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.171441 kubelet[2787]: I1213 15:53:09.171429 2787 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.171476 kubelet[2787]: I1213 15:53:09.171471 2787 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.172951 kubelet[2787]: W1213 15:53:09.172940 2787 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:53:09.173770 kubelet[2787]: W1213 15:53:09.173760 2787 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:53:09.174657 kubelet[2787]: W1213 15:53:09.174648 2787 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:53:09.174704 kubelet[2787]: E1213 15:53:09.174689 2787 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.255697 kernel: audit: type=1327 audit(1734105189.062:209): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:09.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:09.347630 kernel: audit: type=1400 audit(1734105189.062:210): avc: denied { mac_admin } for pid=2787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:09.062000 audit[2787]: AVC avc: denied { mac_admin } for pid=2787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:09.366031 kubelet[2787]: I1213 15:53:09.366014 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366109 kubelet[2787]: I1213 15:53:09.366045 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b5ea6efab99067595fea2183216e71d9-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"b5ea6efab99067595fea2183216e71d9\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366109 kubelet[2787]: I1213 15:53:09.366068 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366109 kubelet[2787]: I1213 15:53:09.366088 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366109 kubelet[2787]: I1213 15:53:09.366107 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366225 kubelet[2787]: I1213 15:53:09.366129 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366225 kubelet[2787]: I1213 15:53:09.366151 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366225 kubelet[2787]: I1213 15:53:09.366173 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/20199668d7fc24f0e559748a092a0871-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"20199668d7fc24f0e559748a092a0871\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.366225 kubelet[2787]: I1213 15:53:09.366213 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/27b0676f31ff25af91d3a114fd047144-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd\" (UID: \"27b0676f31ff25af91d3a114fd047144\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:09.411166 kernel: audit: type=1401 audit(1734105189.062:210): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:09.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:09.443769 kernel: audit: type=1300 audit(1734105189.062:210): arch=c000003e syscall=188 success=no exit=-22 a0=c0007025c0 a1=c00074dd58 a2=c000efa360 a3=25 items=0 ppid=1 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:09.062000 audit[2787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007025c0 a1=c00074dd58 a2=c000efa360 a3=25 items=0 ppid=1 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:09.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:09.632565 kernel: audit: type=1327 audit(1734105189.062:210): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:09.087000 audit[2787]: AVC avc: denied { mac_admin } for pid=2787 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:09.087000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:53:09.087000 audit[2787]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00031f2f0 a1=c0011c6c48 a2=c00031f290 a3=25 items=0 ppid=1 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:09.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:53:10.062345 kubelet[2787]: I1213 15:53:10.062288 2787 apiserver.go:52] "Watching apiserver" Dec 13 15:53:10.064906 kubelet[2787]: I1213 15:53:10.064855 2787 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:53:10.094794 kubelet[2787]: I1213 15:53:10.094773 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-e7c4cc3cdd" podStartSLOduration=1.094742499 podStartE2EDuration="1.094742499s" podCreationTimestamp="2024-12-13 15:53:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:10.084996186 +0000 UTC m=+1.090286636" watchObservedRunningTime="2024-12-13 15:53:10.094742499 +0000 UTC m=+1.100032946" Dec 13 15:53:10.094944 kubelet[2787]: I1213 15:53:10.094835 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-e7c4cc3cdd" podStartSLOduration=1.094825471 podStartE2EDuration="1.094825471s" podCreationTimestamp="2024-12-13 15:53:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:10.094685399 +0000 UTC m=+1.099975853" watchObservedRunningTime="2024-12-13 15:53:10.094825471 +0000 UTC m=+1.100115917" Dec 13 15:53:10.100668 kubelet[2787]: I1213 15:53:10.100646 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-e7c4cc3cdd" podStartSLOduration=3.100603289 podStartE2EDuration="3.100603289s" podCreationTimestamp="2024-12-13 15:53:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:10.100569207 +0000 UTC m=+1.105859655" watchObservedRunningTime="2024-12-13 15:53:10.100603289 +0000 UTC m=+1.105893738" Dec 13 15:53:12.480179 sudo[1924]: pam_unix(sudo:session): session closed for user root Dec 13 15:53:12.478000 audit[1924]: USER_END pid=1924 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:53:12.479000 audit[1924]: CRED_DISP pid=1924 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:53:12.482906 sshd[1918]: pam_unix(sshd:session): session closed for user core Dec 13 15:53:12.483000 audit[1918]: USER_END pid=1918 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:53:12.484000 audit[1918]: CRED_DISP pid=1918 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:53:12.488397 systemd[1]: sshd@8-147.75.203.63:22-139.178.89.65:49650.service: Deactivated successfully. Dec 13 15:53:12.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.63:22-139.178.89.65:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:53:12.490908 systemd-logind[1640]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:53:12.490951 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:53:12.493253 systemd-logind[1640]: Removed session 11. Dec 13 15:53:14.928092 update_engine[1643]: I1213 15:53:14.927990 1643 update_attempter.cc:509] Updating boot flags... Dec 13 15:53:21.850288 kubelet[2787]: I1213 15:53:21.850265 2787 topology_manager.go:215] "Topology Admit Handler" podUID="9381cda1-c412-4471-8dbd-df931c95f35e" podNamespace="kube-system" podName="kube-proxy-l4z4v" Dec 13 15:53:21.862991 kubelet[2787]: I1213 15:53:21.862958 2787 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 15:53:21.863186 env[1651]: time="2024-12-13T15:53:21.863167742Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:53:21.863396 kubelet[2787]: I1213 15:53:21.863275 2787 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 15:53:21.945879 kubelet[2787]: I1213 15:53:21.945759 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9381cda1-c412-4471-8dbd-df931c95f35e-lib-modules\") pod \"kube-proxy-l4z4v\" (UID: \"9381cda1-c412-4471-8dbd-df931c95f35e\") " pod="kube-system/kube-proxy-l4z4v" Dec 13 15:53:21.945879 kubelet[2787]: I1213 15:53:21.945876 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9381cda1-c412-4471-8dbd-df931c95f35e-kube-proxy\") pod \"kube-proxy-l4z4v\" (UID: \"9381cda1-c412-4471-8dbd-df931c95f35e\") " pod="kube-system/kube-proxy-l4z4v" Dec 13 15:53:21.946295 kubelet[2787]: I1213 15:53:21.945952 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9381cda1-c412-4471-8dbd-df931c95f35e-xtables-lock\") pod \"kube-proxy-l4z4v\" (UID: \"9381cda1-c412-4471-8dbd-df931c95f35e\") " pod="kube-system/kube-proxy-l4z4v" Dec 13 15:53:21.946295 kubelet[2787]: I1213 15:53:21.946029 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pplz2\" (UniqueName: \"kubernetes.io/projected/9381cda1-c412-4471-8dbd-df931c95f35e-kube-api-access-pplz2\") pod \"kube-proxy-l4z4v\" (UID: \"9381cda1-c412-4471-8dbd-df931c95f35e\") " pod="kube-system/kube-proxy-l4z4v" Dec 13 15:53:22.090664 kubelet[2787]: I1213 15:53:22.090617 2787 topology_manager.go:215] "Topology Admit Handler" podUID="6ad8526d-9543-4d9c-b5e8-2bf041b39686" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-lqfsg" Dec 13 15:53:22.148646 kubelet[2787]: I1213 15:53:22.148519 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6ad8526d-9543-4d9c-b5e8-2bf041b39686-var-lib-calico\") pod \"tigera-operator-c7ccbd65-lqfsg\" (UID: \"6ad8526d-9543-4d9c-b5e8-2bf041b39686\") " pod="tigera-operator/tigera-operator-c7ccbd65-lqfsg" Dec 13 15:53:22.148646 kubelet[2787]: I1213 15:53:22.148597 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w22z4\" (UniqueName: \"kubernetes.io/projected/6ad8526d-9543-4d9c-b5e8-2bf041b39686-kube-api-access-w22z4\") pod \"tigera-operator-c7ccbd65-lqfsg\" (UID: \"6ad8526d-9543-4d9c-b5e8-2bf041b39686\") " pod="tigera-operator/tigera-operator-c7ccbd65-lqfsg" Dec 13 15:53:22.153446 env[1651]: time="2024-12-13T15:53:22.153388994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l4z4v,Uid:9381cda1-c412-4471-8dbd-df931c95f35e,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:22.191656 env[1651]: time="2024-12-13T15:53:22.191427153Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:22.191656 env[1651]: time="2024-12-13T15:53:22.191572031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:22.191656 env[1651]: time="2024-12-13T15:53:22.191618302Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:22.192172 env[1651]: time="2024-12-13T15:53:22.192031960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e33351c45bcae010775a9a29cb75d6ca045e60fba1ca192ee91ab40ac78d0c4e pid=2976 runtime=io.containerd.runc.v2 Dec 13 15:53:22.244296 env[1651]: time="2024-12-13T15:53:22.244218037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-l4z4v,Uid:9381cda1-c412-4471-8dbd-df931c95f35e,Namespace:kube-system,Attempt:0,} returns sandbox id \"e33351c45bcae010775a9a29cb75d6ca045e60fba1ca192ee91ab40ac78d0c4e\"" Dec 13 15:53:22.246789 env[1651]: time="2024-12-13T15:53:22.246752655Z" level=info msg="CreateContainer within sandbox \"e33351c45bcae010775a9a29cb75d6ca045e60fba1ca192ee91ab40ac78d0c4e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:53:22.255149 env[1651]: time="2024-12-13T15:53:22.255080473Z" level=info msg="CreateContainer within sandbox \"e33351c45bcae010775a9a29cb75d6ca045e60fba1ca192ee91ab40ac78d0c4e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"56e8b78767c129953992233a49c36c080674263a55efcc1a4322118d34989fd1\"" Dec 13 15:53:22.255535 env[1651]: time="2024-12-13T15:53:22.255503642Z" level=info msg="StartContainer for \"56e8b78767c129953992233a49c36c080674263a55efcc1a4322118d34989fd1\"" Dec 13 15:53:22.300907 env[1651]: time="2024-12-13T15:53:22.300860926Z" level=info msg="StartContainer for \"56e8b78767c129953992233a49c36c080674263a55efcc1a4322118d34989fd1\" returns successfully" Dec 13 15:53:22.350000 audit[3079]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.377843 kernel: kauditd_printk_skb: 9 callbacks suppressed Dec 13 15:53:22.377937 kernel: audit: type=1325 audit(1734105202.350:217): table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.394655 env[1651]: time="2024-12-13T15:53:22.394602570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-lqfsg,Uid:6ad8526d-9543-4d9c-b5e8-2bf041b39686,Namespace:tigera-operator,Attempt:0,}" Dec 13 15:53:22.403694 env[1651]: time="2024-12-13T15:53:22.403609445Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:22.403694 env[1651]: time="2024-12-13T15:53:22.403629845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:22.403694 env[1651]: time="2024-12-13T15:53:22.403640034Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:22.403813 env[1651]: time="2024-12-13T15:53:22.403717234Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2deaebbd3c75c0c58ba90a1c2a578daf5ed13b620ab57a286c28724fe708d08 pid=3097 runtime=io.containerd.runc.v2 Dec 13 15:53:22.350000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7171c8b0 a2=0 a3=7fff7171c89c items=0 ppid=3027 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.530713 kernel: audit: type=1300 audit(1734105202.350:217): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7171c8b0 a2=0 a3=7fff7171c89c items=0 ppid=3027 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.530772 kernel: audit: type=1327 audit(1734105202.350:217): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:53:22.588230 kernel: audit: type=1325 audit(1734105202.350:218): table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:22.350000 audit[3078]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:22.350000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc235da730 a2=0 a3=9d2d3a7e66d6188a items=0 ppid=3027 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.741239 kernel: audit: type=1300 audit(1734105202.350:218): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc235da730 a2=0 a3=9d2d3a7e66d6188a items=0 ppid=3027 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.741267 kernel: audit: type=1327 audit(1734105202.350:218): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:53:22.798801 kernel: audit: type=1325 audit(1734105202.350:219): table=nat:40 family=2 entries=1 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.350000 audit[3081]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.855926 kernel: audit: type=1300 audit(1734105202.350:219): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffced780590 a2=0 a3=7ffced78057c items=0 ppid=3027 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.350000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffced780590 a2=0 a3=7ffced78057c items=0 ppid=3027 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.951535 kernel: audit: type=1327 audit(1734105202.350:219): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:53:22.957333 env[1651]: time="2024-12-13T15:53:22.957281347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-lqfsg,Uid:6ad8526d-9543-4d9c-b5e8-2bf041b39686,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d2deaebbd3c75c0c58ba90a1c2a578daf5ed13b620ab57a286c28724fe708d08\"" Dec 13 15:53:22.958048 env[1651]: time="2024-12-13T15:53:22.957999856Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 15:53:23.008863 kernel: audit: type=1325 audit(1734105202.350:220): table=nat:41 family=10 entries=1 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:22.350000 audit[3082]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:22.350000 audit[3082]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3c40a350 a2=0 a3=183db671a715792c items=0 ppid=3027 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:53:22.350000 audit[3088]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.350000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9e755290 a2=0 a3=7ffd9e75527c items=0 ppid=3027 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:53:22.350000 audit[3089]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3089 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:22.350000 audit[3089]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6383a7a0 a2=0 a3=7fff6383a78c items=0 ppid=3027 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:53:22.449000 audit[3123]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.449000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff27558710 a2=0 a3=7fff275586fc items=0 ppid=3027 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:53:22.454000 audit[3125]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.454000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc885502d0 a2=0 a3=7ffc885502bc items=0 ppid=3027 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:53:22.454000 audit[3128]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.454000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff9180ece0 a2=0 a3=7fff9180eccc items=0 ppid=3027 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:53:22.454000 audit[3129]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.454000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9fc8ec50 a2=0 a3=7fff9fc8ec3c items=0 ppid=3027 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:53:22.454000 audit[3131]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.454000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4684d5d0 a2=0 a3=7fff4684d5bc items=0 ppid=3027 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:53:22.454000 audit[3132]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.454000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe10951080 a2=0 a3=7ffe1095106c items=0 ppid=3027 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:53:22.459000 audit[3134]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.459000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcdd86d640 a2=0 a3=7ffcdd86d62c items=0 ppid=3027 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:53:22.459000 audit[3137]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.459000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd46ac4ce0 a2=0 a3=7ffd46ac4ccc items=0 ppid=3027 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:53:22.459000 audit[3138]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.459000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe41733c60 a2=0 a3=7ffe41733c4c items=0 ppid=3027 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:53:22.459000 audit[3140]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.459000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc86cdad60 a2=0 a3=7ffc86cdad4c items=0 ppid=3027 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:53:22.459000 audit[3141]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.459000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf0ff20f0 a2=0 a3=7ffdf0ff20dc items=0 ppid=3027 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:53:22.587000 audit[3143]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:22.587000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffb892600 a2=0 a3=7ffffb8925ec items=0 ppid=3027 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:22.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:53:23.068000 audit[3153]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.068000 audit[3153]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd17879800 a2=0 a3=7ffd178797ec items=0 ppid=3027 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:53:23.068000 audit[3156]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.068000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8e038220 a2=0 a3=7fff8e03820c items=0 ppid=3027 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:53:23.069000 audit[3157]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.069000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc93c04630 a2=0 a3=7ffc93c0461c items=0 ppid=3027 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:53:23.070000 audit[3159]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.070000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdb5460060 a2=0 a3=7ffdb546004c items=0 ppid=3027 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:53:23.072000 audit[3162]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.072000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf0330c10 a2=0 a3=7ffcf0330bfc items=0 ppid=3027 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:53:23.073000 audit[3163]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.073000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfcdc8e60 a2=0 a3=7ffcfcdc8e4c items=0 ppid=3027 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:53:23.074000 audit[3165]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:53:23.074000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffb22be9b0 a2=0 a3=7fffb22be99c items=0 ppid=3027 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:53:23.087000 audit[3171]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:23.087000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdd26d0b80 a2=0 a3=7ffdd26d0b6c items=0 ppid=3027 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:23.103000 audit[3171]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:23.103000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdd26d0b80 a2=0 a3=7ffdd26d0b6c items=0 ppid=3027 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:23.104000 audit[3176]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.104000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed2ae7190 a2=0 a3=7ffed2ae717c items=0 ppid=3027 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:53:23.106629 kubelet[2787]: I1213 15:53:23.106609 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-l4z4v" podStartSLOduration=2.10657869 podStartE2EDuration="2.10657869s" podCreationTimestamp="2024-12-13 15:53:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:23.106558944 +0000 UTC m=+14.111849388" watchObservedRunningTime="2024-12-13 15:53:23.10657869 +0000 UTC m=+14.111869136" Dec 13 15:53:23.106000 audit[3178]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.106000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe356ffc30 a2=0 a3=7ffe356ffc1c items=0 ppid=3027 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:53:23.108000 audit[3181]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.108000 audit[3181]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc97875840 a2=0 a3=7ffc9787582c items=0 ppid=3027 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:53:23.108000 audit[3182]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.108000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe20d0a240 a2=0 a3=7ffe20d0a22c items=0 ppid=3027 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:53:23.109000 audit[3184]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.109000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefe82eb60 a2=0 a3=7ffefe82eb4c items=0 ppid=3027 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:53:23.110000 audit[3185]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.110000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc69a39e70 a2=0 a3=7ffc69a39e5c items=0 ppid=3027 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:53:23.111000 audit[3187]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.111000 audit[3187]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd423b810 a2=0 a3=7fffd423b7fc items=0 ppid=3027 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:53:23.113000 audit[3190]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.113000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe457c9180 a2=0 a3=7ffe457c916c items=0 ppid=3027 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:53:23.114000 audit[3191]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.114000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc366acb10 a2=0 a3=7ffc366acafc items=0 ppid=3027 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:53:23.116000 audit[3193]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.116000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda85e84b0 a2=0 a3=7ffda85e849c items=0 ppid=3027 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:53:23.117000 audit[3194]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.117000 audit[3194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee28096a0 a2=0 a3=7ffee280968c items=0 ppid=3027 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:53:23.118000 audit[3196]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.118000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf797ad50 a2=0 a3=7ffcf797ad3c items=0 ppid=3027 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:53:23.119000 audit[3199]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.119000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe49b050f0 a2=0 a3=7ffe49b050dc items=0 ppid=3027 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:53:23.121000 audit[3202]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.121000 audit[3202]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb07640a0 a2=0 a3=7ffeb076408c items=0 ppid=3027 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:53:23.121000 audit[3203]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.121000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce4fbcc40 a2=0 a3=7ffce4fbcc2c items=0 ppid=3027 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:53:23.124000 audit[3205]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.124000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd10569410 a2=0 a3=7ffd105693fc items=0 ppid=3027 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:53:23.126000 audit[3208]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.126000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc8534cac0 a2=0 a3=7ffc8534caac items=0 ppid=3027 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:53:23.126000 audit[3209]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.126000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3c93f2e0 a2=0 a3=7ffe3c93f2cc items=0 ppid=3027 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:53:23.126000 audit[3211]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.126000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc9a401970 a2=0 a3=7ffc9a40195c items=0 ppid=3027 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:53:23.128000 audit[3212]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.128000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff270c04d0 a2=0 a3=7fff270c04bc items=0 ppid=3027 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:53:23.128000 audit[3214]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.128000 audit[3214]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3b8a8f30 a2=0 a3=7fff3b8a8f1c items=0 ppid=3027 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:53:23.130000 audit[3217]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:53:23.130000 audit[3217]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9ddf6e60 a2=0 a3=7ffc9ddf6e4c items=0 ppid=3027 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:53:23.132000 audit[3219]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:53:23.132000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffde1058da0 a2=0 a3=7ffde1058d8c items=0 ppid=3027 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.132000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:23.132000 audit[3219]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:53:23.132000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffde1058da0 a2=0 a3=7ffde1058d8c items=0 ppid=3027 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:23.132000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:25.068742 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4117578219.mount: Deactivated successfully. Dec 13 15:53:25.488501 env[1651]: time="2024-12-13T15:53:25.488445676Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:25.489059 env[1651]: time="2024-12-13T15:53:25.489020556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:25.489643 env[1651]: time="2024-12-13T15:53:25.489601273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:25.490684 env[1651]: time="2024-12-13T15:53:25.490640660Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:25.490921 env[1651]: time="2024-12-13T15:53:25.490879203Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 15:53:25.492242 env[1651]: time="2024-12-13T15:53:25.492205746Z" level=info msg="CreateContainer within sandbox \"d2deaebbd3c75c0c58ba90a1c2a578daf5ed13b620ab57a286c28724fe708d08\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 15:53:25.496262 env[1651]: time="2024-12-13T15:53:25.496218631Z" level=info msg="CreateContainer within sandbox \"d2deaebbd3c75c0c58ba90a1c2a578daf5ed13b620ab57a286c28724fe708d08\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"9c5339823d32dc81e29aaf7162249d924d56604edc32bd845ff74d9a60f54ca5\"" Dec 13 15:53:25.496461 env[1651]: time="2024-12-13T15:53:25.496450278Z" level=info msg="StartContainer for \"9c5339823d32dc81e29aaf7162249d924d56604edc32bd845ff74d9a60f54ca5\"" Dec 13 15:53:25.517301 env[1651]: time="2024-12-13T15:53:25.517239226Z" level=info msg="StartContainer for \"9c5339823d32dc81e29aaf7162249d924d56604edc32bd845ff74d9a60f54ca5\" returns successfully" Dec 13 15:53:26.118656 kubelet[2787]: I1213 15:53:26.118637 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-lqfsg" podStartSLOduration=1.585239653 podStartE2EDuration="4.118610523s" podCreationTimestamp="2024-12-13 15:53:22 +0000 UTC" firstStartedPulling="2024-12-13 15:53:22.957798957 +0000 UTC m=+13.963089403" lastFinishedPulling="2024-12-13 15:53:25.491169827 +0000 UTC m=+16.496460273" observedRunningTime="2024-12-13 15:53:26.11842862 +0000 UTC m=+17.123719071" watchObservedRunningTime="2024-12-13 15:53:26.118610523 +0000 UTC m=+17.123900970" Dec 13 15:53:28.149000 audit[3270]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.186676 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 15:53:28.186726 kernel: audit: type=1325 audit(1734105208.149:268): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.149000 audit[3270]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa9da02b0 a2=0 a3=7fffa9da029c items=0 ppid=3027 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.340828 kernel: audit: type=1300 audit(1734105208.149:268): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa9da02b0 a2=0 a3=7fffa9da029c items=0 ppid=3027 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.340883 kernel: audit: type=1327 audit(1734105208.149:268): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.348718 kubelet[2787]: I1213 15:53:28.348693 2787 topology_manager.go:215] "Topology Admit Handler" podUID="f1b11fa2-8472-4a53-8eab-59d043713eb0" podNamespace="calico-system" podName="calico-typha-78c4648f7-hm57f" Dec 13 15:53:28.350032 kubelet[2787]: I1213 15:53:28.350003 2787 topology_manager.go:215] "Topology Admit Handler" podUID="9a44d5d9-bd18-44cb-b183-25ee4e633629" podNamespace="calico-system" podName="calico-node-jlr25" Dec 13 15:53:28.385405 kubelet[2787]: I1213 15:53:28.385384 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-policysync\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385405 kubelet[2787]: I1213 15:53:28.385409 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9a44d5d9-bd18-44cb-b183-25ee4e633629-tigera-ca-bundle\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385524 kubelet[2787]: I1213 15:53:28.385422 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rw9dw\" (UniqueName: \"kubernetes.io/projected/9a44d5d9-bd18-44cb-b183-25ee4e633629-kube-api-access-rw9dw\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385524 kubelet[2787]: I1213 15:53:28.385434 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-lib-modules\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385524 kubelet[2787]: I1213 15:53:28.385446 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9a44d5d9-bd18-44cb-b183-25ee4e633629-node-certs\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385590 kubelet[2787]: I1213 15:53:28.385524 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k88lr\" (UniqueName: \"kubernetes.io/projected/f1b11fa2-8472-4a53-8eab-59d043713eb0-kube-api-access-k88lr\") pod \"calico-typha-78c4648f7-hm57f\" (UID: \"f1b11fa2-8472-4a53-8eab-59d043713eb0\") " pod="calico-system/calico-typha-78c4648f7-hm57f" Dec 13 15:53:28.385590 kubelet[2787]: I1213 15:53:28.385544 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-var-run-calico\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385590 kubelet[2787]: I1213 15:53:28.385558 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-cni-log-dir\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385590 kubelet[2787]: I1213 15:53:28.385581 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f1b11fa2-8472-4a53-8eab-59d043713eb0-typha-certs\") pod \"calico-typha-78c4648f7-hm57f\" (UID: \"f1b11fa2-8472-4a53-8eab-59d043713eb0\") " pod="calico-system/calico-typha-78c4648f7-hm57f" Dec 13 15:53:28.385660 kubelet[2787]: I1213 15:53:28.385594 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-xtables-lock\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385660 kubelet[2787]: I1213 15:53:28.385605 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-var-lib-calico\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385660 kubelet[2787]: I1213 15:53:28.385615 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-cni-bin-dir\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385660 kubelet[2787]: I1213 15:53:28.385639 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-flexvol-driver-host\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.385728 kubelet[2787]: I1213 15:53:28.385661 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f1b11fa2-8472-4a53-8eab-59d043713eb0-tigera-ca-bundle\") pod \"calico-typha-78c4648f7-hm57f\" (UID: \"f1b11fa2-8472-4a53-8eab-59d043713eb0\") " pod="calico-system/calico-typha-78c4648f7-hm57f" Dec 13 15:53:28.385728 kubelet[2787]: I1213 15:53:28.385678 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9a44d5d9-bd18-44cb-b183-25ee4e633629-cni-net-dir\") pod \"calico-node-jlr25\" (UID: \"9a44d5d9-bd18-44cb-b183-25ee4e633629\") " pod="calico-system/calico-node-jlr25" Dec 13 15:53:28.390510 kubelet[2787]: I1213 15:53:28.390492 2787 topology_manager.go:215] "Topology Admit Handler" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" podNamespace="calico-system" podName="csi-node-driver-5jjgl" Dec 13 15:53:28.390691 kubelet[2787]: E1213 15:53:28.390682 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:28.400000 audit[3270]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.400000 audit[3270]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa9da02b0 a2=0 a3=0 items=0 ppid=3027 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.486725 kubelet[2787]: I1213 15:53:28.486679 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/80375860-a9a0-4c6e-a9be-55cca33b4166-varrun\") pod \"csi-node-driver-5jjgl\" (UID: \"80375860-a9a0-4c6e-a9be-55cca33b4166\") " pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:28.486725 kubelet[2787]: I1213 15:53:28.486725 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/80375860-a9a0-4c6e-a9be-55cca33b4166-kubelet-dir\") pod \"csi-node-driver-5jjgl\" (UID: \"80375860-a9a0-4c6e-a9be-55cca33b4166\") " pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:28.486898 kubelet[2787]: I1213 15:53:28.486751 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/80375860-a9a0-4c6e-a9be-55cca33b4166-socket-dir\") pod \"csi-node-driver-5jjgl\" (UID: \"80375860-a9a0-4c6e-a9be-55cca33b4166\") " pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:28.486898 kubelet[2787]: I1213 15:53:28.486861 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7bnp\" (UniqueName: \"kubernetes.io/projected/80375860-a9a0-4c6e-a9be-55cca33b4166-kube-api-access-r7bnp\") pod \"csi-node-driver-5jjgl\" (UID: \"80375860-a9a0-4c6e-a9be-55cca33b4166\") " pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:28.486948 kubelet[2787]: I1213 15:53:28.486942 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/80375860-a9a0-4c6e-a9be-55cca33b4166-registration-dir\") pod \"csi-node-driver-5jjgl\" (UID: \"80375860-a9a0-4c6e-a9be-55cca33b4166\") " pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:28.487711 kubelet[2787]: E1213 15:53:28.487702 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.487711 kubelet[2787]: W1213 15:53:28.487711 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.487769 kubelet[2787]: E1213 15:53:28.487724 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.487879 kubelet[2787]: E1213 15:53:28.487843 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.487879 kubelet[2787]: W1213 15:53:28.487850 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.487879 kubelet[2787]: E1213 15:53:28.487858 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.488821 kubelet[2787]: E1213 15:53:28.488814 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.488821 kubelet[2787]: W1213 15:53:28.488821 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.488873 kubelet[2787]: E1213 15:53:28.488828 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.489095 kubelet[2787]: E1213 15:53:28.489055 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.489095 kubelet[2787]: W1213 15:53:28.489069 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.489095 kubelet[2787]: E1213 15:53:28.489086 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.492398 kubelet[2787]: E1213 15:53:28.492391 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.492398 kubelet[2787]: W1213 15:53:28.492397 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.492457 kubelet[2787]: E1213 15:53:28.492404 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.492955 kubelet[2787]: E1213 15:53:28.492940 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.492990 kubelet[2787]: W1213 15:53:28.492959 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.493011 kubelet[2787]: E1213 15:53:28.492986 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.555761 kernel: audit: type=1325 audit(1734105208.400:269): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.555792 kernel: audit: type=1300 audit(1734105208.400:269): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa9da02b0 a2=0 a3=0 items=0 ppid=3027 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.587320 kubelet[2787]: E1213 15:53:28.587281 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587320 kubelet[2787]: W1213 15:53:28.587290 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587320 kubelet[2787]: E1213 15:53:28.587303 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587427 kubelet[2787]: E1213 15:53:28.587401 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587427 kubelet[2787]: W1213 15:53:28.587405 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587427 kubelet[2787]: E1213 15:53:28.587412 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587490 kubelet[2787]: E1213 15:53:28.587483 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587490 kubelet[2787]: W1213 15:53:28.587490 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587533 kubelet[2787]: E1213 15:53:28.587498 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587608 kubelet[2787]: E1213 15:53:28.587573 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587608 kubelet[2787]: W1213 15:53:28.587579 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587608 kubelet[2787]: E1213 15:53:28.587588 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587675 kubelet[2787]: E1213 15:53:28.587653 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587675 kubelet[2787]: W1213 15:53:28.587657 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587675 kubelet[2787]: E1213 15:53:28.587664 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587803 kubelet[2787]: E1213 15:53:28.587766 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587803 kubelet[2787]: W1213 15:53:28.587770 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587803 kubelet[2787]: E1213 15:53:28.587776 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.587941 kubelet[2787]: E1213 15:53:28.587908 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.587941 kubelet[2787]: W1213 15:53:28.587912 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.587941 kubelet[2787]: E1213 15:53:28.587919 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.588016 kubelet[2787]: E1213 15:53:28.587999 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.588016 kubelet[2787]: W1213 15:53:28.588003 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.588016 kubelet[2787]: E1213 15:53:28.588010 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.588075 kubelet[2787]: E1213 15:53:28.588070 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.588075 kubelet[2787]: W1213 15:53:28.588074 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.588113 kubelet[2787]: E1213 15:53:28.588080 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.588332 kubelet[2787]: E1213 15:53:28.588287 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.588332 kubelet[2787]: W1213 15:53:28.588307 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.588384 kubelet[2787]: E1213 15:53:28.588342 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.588597 kubelet[2787]: E1213 15:53:28.588554 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.588597 kubelet[2787]: W1213 15:53:28.588572 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.588657 kubelet[2787]: E1213 15:53:28.588599 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.588886 kubelet[2787]: E1213 15:53:28.588843 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.588886 kubelet[2787]: W1213 15:53:28.588861 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.588943 kubelet[2787]: E1213 15:53:28.588905 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.589080 kubelet[2787]: E1213 15:53:28.589039 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.589080 kubelet[2787]: W1213 15:53:28.589056 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.589139 kubelet[2787]: E1213 15:53:28.589081 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.589259 kubelet[2787]: E1213 15:53:28.589248 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.589282 kubelet[2787]: W1213 15:53:28.589263 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.589301 kubelet[2787]: E1213 15:53:28.589288 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.589490 kubelet[2787]: E1213 15:53:28.589475 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.589517 kubelet[2787]: W1213 15:53:28.589502 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.589541 kubelet[2787]: E1213 15:53:28.589532 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.589761 kubelet[2787]: E1213 15:53:28.589715 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.589761 kubelet[2787]: W1213 15:53:28.589733 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.589761 kubelet[2787]: E1213 15:53:28.589755 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.589959 kubelet[2787]: E1213 15:53:28.589919 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.589959 kubelet[2787]: W1213 15:53:28.589934 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590017 kubelet[2787]: E1213 15:53:28.589955 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.590142 kubelet[2787]: E1213 15:53:28.590106 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.590142 kubelet[2787]: W1213 15:53:28.590124 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590182 kubelet[2787]: E1213 15:53:28.590146 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.590324 kubelet[2787]: E1213 15:53:28.590313 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.590343 kubelet[2787]: W1213 15:53:28.590326 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590366 kubelet[2787]: E1213 15:53:28.590350 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.590560 kubelet[2787]: E1213 15:53:28.590505 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.590560 kubelet[2787]: W1213 15:53:28.590522 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590560 kubelet[2787]: E1213 15:53:28.590545 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.590732 kubelet[2787]: E1213 15:53:28.590692 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.590732 kubelet[2787]: W1213 15:53:28.590706 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590787 kubelet[2787]: E1213 15:53:28.590729 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.590915 kubelet[2787]: E1213 15:53:28.590877 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.590915 kubelet[2787]: W1213 15:53:28.590882 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.590915 kubelet[2787]: E1213 15:53:28.590890 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.591012 kubelet[2787]: E1213 15:53:28.591007 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.591031 kubelet[2787]: W1213 15:53:28.591012 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.591031 kubelet[2787]: E1213 15:53:28.591020 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.591129 kubelet[2787]: E1213 15:53:28.591124 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.591129 kubelet[2787]: W1213 15:53:28.591129 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.591164 kubelet[2787]: E1213 15:53:28.591134 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.591299 kubelet[2787]: E1213 15:53:28.591294 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.591318 kubelet[2787]: W1213 15:53:28.591298 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.591318 kubelet[2787]: E1213 15:53:28.591304 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.596386 kubelet[2787]: E1213 15:53:28.596350 2787 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:53:28.596386 kubelet[2787]: W1213 15:53:28.596356 2787 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:53:28.596386 kubelet[2787]: E1213 15:53:28.596364 2787 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:53:28.613656 kernel: audit: type=1327 audit(1734105208.400:269): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.628000 audit[3309]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.652551 env[1651]: time="2024-12-13T15:53:28.652527104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-78c4648f7-hm57f,Uid:f1b11fa2-8472-4a53-8eab-59d043713eb0,Namespace:calico-system,Attempt:0,}" Dec 13 15:53:28.653899 env[1651]: time="2024-12-13T15:53:28.653849719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jlr25,Uid:9a44d5d9-bd18-44cb-b183-25ee4e633629,Namespace:calico-system,Attempt:0,}" Dec 13 15:53:28.661711 env[1651]: time="2024-12-13T15:53:28.661667438Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:28.661711 env[1651]: time="2024-12-13T15:53:28.661690433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:28.661711 env[1651]: time="2024-12-13T15:53:28.661697710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:28.661911 env[1651]: time="2024-12-13T15:53:28.661793914Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce311a7dd2279b6a635dd99a5f5b107927db651d0c46053ee2708c94163257fc pid=3317 runtime=io.containerd.runc.v2 Dec 13 15:53:28.662932 env[1651]: time="2024-12-13T15:53:28.662897878Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:28.662932 env[1651]: time="2024-12-13T15:53:28.662920392Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:28.662932 env[1651]: time="2024-12-13T15:53:28.662927713Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:28.663041 env[1651]: time="2024-12-13T15:53:28.662997139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1 pid=3328 runtime=io.containerd.runc.v2 Dec 13 15:53:28.628000 audit[3309]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff652423f0 a2=0 a3=7fff652423dc items=0 ppid=3027 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.786410 kernel: audit: type=1325 audit(1734105208.628:270): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.786479 kernel: audit: type=1300 audit(1734105208.628:270): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff652423f0 a2=0 a3=7fff652423dc items=0 ppid=3027 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.786502 kernel: audit: type=1327 audit(1734105208.628:270): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.846000 audit[3309]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.849961 env[1651]: time="2024-12-13T15:53:28.849931667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jlr25,Uid:9a44d5d9-bd18-44cb-b183-25ee4e633629,Namespace:calico-system,Attempt:0,} returns sandbox id \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\"" Dec 13 15:53:28.850771 env[1651]: time="2024-12-13T15:53:28.850757043Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:53:28.846000 audit[3309]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff652423f0 a2=0 a3=0 items=0 ppid=3027 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:28.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:28.907495 kernel: audit: type=1325 audit(1734105208.846:271): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:28.913269 env[1651]: time="2024-12-13T15:53:28.913241969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-78c4648f7-hm57f,Uid:f1b11fa2-8472-4a53-8eab-59d043713eb0,Namespace:calico-system,Attempt:0,} returns sandbox id \"ce311a7dd2279b6a635dd99a5f5b107927db651d0c46053ee2708c94163257fc\"" Dec 13 15:53:30.070999 kubelet[2787]: E1213 15:53:30.070897 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:30.353803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3784171961.mount: Deactivated successfully. Dec 13 15:53:30.531184 env[1651]: time="2024-12-13T15:53:30.531134230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:30.531677 env[1651]: time="2024-12-13T15:53:30.531632889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:30.532305 env[1651]: time="2024-12-13T15:53:30.532259776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:30.533337 env[1651]: time="2024-12-13T15:53:30.533301117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:30.533473 env[1651]: time="2024-12-13T15:53:30.533463018Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:53:30.533875 env[1651]: time="2024-12-13T15:53:30.533835524Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 15:53:30.534835 env[1651]: time="2024-12-13T15:53:30.534792029Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:53:30.539607 env[1651]: time="2024-12-13T15:53:30.539564928Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25\"" Dec 13 15:53:30.539818 env[1651]: time="2024-12-13T15:53:30.539759373Z" level=info msg="StartContainer for \"96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25\"" Dec 13 15:53:30.564706 env[1651]: time="2024-12-13T15:53:30.564628838Z" level=info msg="StartContainer for \"96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25\" returns successfully" Dec 13 15:53:30.580007 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25-rootfs.mount: Deactivated successfully. Dec 13 15:53:31.146344 env[1651]: time="2024-12-13T15:53:31.146219143Z" level=info msg="shim disconnected" id=96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25 Dec 13 15:53:31.146859 env[1651]: time="2024-12-13T15:53:31.146337919Z" level=warning msg="cleaning up after shim disconnected" id=96687c05172725211fffaee9f798d440b312927592ec5d3717355780b48b6c25 namespace=k8s.io Dec 13 15:53:31.146859 env[1651]: time="2024-12-13T15:53:31.146381617Z" level=info msg="cleaning up dead shim" Dec 13 15:53:31.163675 env[1651]: time="2024-12-13T15:53:31.163605327Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:53:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3436 runtime=io.containerd.runc.v2\n" Dec 13 15:53:32.070693 kubelet[2787]: E1213 15:53:32.070651 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:32.371762 env[1651]: time="2024-12-13T15:53:32.371675412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:32.372296 env[1651]: time="2024-12-13T15:53:32.372282252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:32.373075 env[1651]: time="2024-12-13T15:53:32.373062997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:32.373733 env[1651]: time="2024-12-13T15:53:32.373722410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:32.374002 env[1651]: time="2024-12-13T15:53:32.373989735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 15:53:32.374392 env[1651]: time="2024-12-13T15:53:32.374379742Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:53:32.378448 env[1651]: time="2024-12-13T15:53:32.378431652Z" level=info msg="CreateContainer within sandbox \"ce311a7dd2279b6a635dd99a5f5b107927db651d0c46053ee2708c94163257fc\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 15:53:32.383160 env[1651]: time="2024-12-13T15:53:32.383075986Z" level=info msg="CreateContainer within sandbox \"ce311a7dd2279b6a635dd99a5f5b107927db651d0c46053ee2708c94163257fc\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0c81637a092e3d1ca6da024077dd8692c0084d0a61cb4365b4e5ce09d90fd304\"" Dec 13 15:53:32.383384 env[1651]: time="2024-12-13T15:53:32.383368334Z" level=info msg="StartContainer for \"0c81637a092e3d1ca6da024077dd8692c0084d0a61cb4365b4e5ce09d90fd304\"" Dec 13 15:53:32.416218 env[1651]: time="2024-12-13T15:53:32.416185097Z" level=info msg="StartContainer for \"0c81637a092e3d1ca6da024077dd8692c0084d0a61cb4365b4e5ce09d90fd304\" returns successfully" Dec 13 15:53:33.153772 kubelet[2787]: I1213 15:53:33.153707 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-78c4648f7-hm57f" podStartSLOduration=1.693187512 podStartE2EDuration="5.153599004s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:28.913784683 +0000 UTC m=+19.919075128" lastFinishedPulling="2024-12-13 15:53:32.374196174 +0000 UTC m=+23.379486620" observedRunningTime="2024-12-13 15:53:33.153197545 +0000 UTC m=+24.158488056" watchObservedRunningTime="2024-12-13 15:53:33.153599004 +0000 UTC m=+24.158889498" Dec 13 15:53:34.070918 kubelet[2787]: E1213 15:53:34.070857 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:34.136175 kubelet[2787]: I1213 15:53:34.136123 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:35.462461 env[1651]: time="2024-12-13T15:53:35.462437061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:35.462943 env[1651]: time="2024-12-13T15:53:35.462930004Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:35.463719 env[1651]: time="2024-12-13T15:53:35.463696511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:35.464344 env[1651]: time="2024-12-13T15:53:35.464331718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:35.464667 env[1651]: time="2024-12-13T15:53:35.464653378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:53:35.465829 env[1651]: time="2024-12-13T15:53:35.465815026Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:53:35.470706 env[1651]: time="2024-12-13T15:53:35.470661596Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35\"" Dec 13 15:53:35.471008 env[1651]: time="2024-12-13T15:53:35.470942124Z" level=info msg="StartContainer for \"63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35\"" Dec 13 15:53:35.495170 env[1651]: time="2024-12-13T15:53:35.495143130Z" level=info msg="StartContainer for \"63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35\" returns successfully" Dec 13 15:53:36.070791 kubelet[2787]: E1213 15:53:36.070716 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:36.340348 env[1651]: time="2024-12-13T15:53:36.340120961Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:53:36.386289 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35-rootfs.mount: Deactivated successfully. Dec 13 15:53:36.419223 kubelet[2787]: I1213 15:53:36.419182 2787 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:53:36.461616 kubelet[2787]: I1213 15:53:36.461540 2787 topology_manager.go:215] "Topology Admit Handler" podUID="2e8d2123-8a9b-4013-bb94-627070fe5c90" podNamespace="kube-system" podName="coredns-76f75df574-nzrw8" Dec 13 15:53:36.462991 kubelet[2787]: I1213 15:53:36.462913 2787 topology_manager.go:215] "Topology Admit Handler" podUID="8779ad05-9879-42e8-a691-1ed0ef8805f1" podNamespace="kube-system" podName="coredns-76f75df574-75hcb" Dec 13 15:53:36.464102 kubelet[2787]: I1213 15:53:36.464036 2787 topology_manager.go:215] "Topology Admit Handler" podUID="8a45be52-033d-46a8-8ad1-8f1fdf02dd74" podNamespace="calico-apiserver" podName="calico-apiserver-6dd7c694db-tpndz" Dec 13 15:53:36.465419 kubelet[2787]: I1213 15:53:36.465370 2787 topology_manager.go:215] "Topology Admit Handler" podUID="a6cc89e0-6b80-465a-a3f6-12a073cbec84" podNamespace="calico-system" podName="calico-kube-controllers-5cb4d6b588-tpzhl" Dec 13 15:53:36.466697 kubelet[2787]: I1213 15:53:36.466643 2787 topology_manager.go:215] "Topology Admit Handler" podUID="fe2393e8-3242-44fa-9d23-977e3f63201d" podNamespace="calico-apiserver" podName="calico-apiserver-6dd7c694db-csnsm" Dec 13 15:53:36.643552 kubelet[2787]: I1213 15:53:36.643317 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjdsb\" (UniqueName: \"kubernetes.io/projected/2e8d2123-8a9b-4013-bb94-627070fe5c90-kube-api-access-jjdsb\") pod \"coredns-76f75df574-nzrw8\" (UID: \"2e8d2123-8a9b-4013-bb94-627070fe5c90\") " pod="kube-system/coredns-76f75df574-nzrw8" Dec 13 15:53:36.643552 kubelet[2787]: I1213 15:53:36.643456 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6dgkf\" (UniqueName: \"kubernetes.io/projected/a6cc89e0-6b80-465a-a3f6-12a073cbec84-kube-api-access-6dgkf\") pod \"calico-kube-controllers-5cb4d6b588-tpzhl\" (UID: \"a6cc89e0-6b80-465a-a3f6-12a073cbec84\") " pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" Dec 13 15:53:36.643919 kubelet[2787]: I1213 15:53:36.643567 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fe2393e8-3242-44fa-9d23-977e3f63201d-calico-apiserver-certs\") pod \"calico-apiserver-6dd7c694db-csnsm\" (UID: \"fe2393e8-3242-44fa-9d23-977e3f63201d\") " pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" Dec 13 15:53:36.643919 kubelet[2787]: I1213 15:53:36.643639 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a6cc89e0-6b80-465a-a3f6-12a073cbec84-tigera-ca-bundle\") pod \"calico-kube-controllers-5cb4d6b588-tpzhl\" (UID: \"a6cc89e0-6b80-465a-a3f6-12a073cbec84\") " pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" Dec 13 15:53:36.643919 kubelet[2787]: I1213 15:53:36.643823 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2e8d2123-8a9b-4013-bb94-627070fe5c90-config-volume\") pod \"coredns-76f75df574-nzrw8\" (UID: \"2e8d2123-8a9b-4013-bb94-627070fe5c90\") " pod="kube-system/coredns-76f75df574-nzrw8" Dec 13 15:53:36.644233 kubelet[2787]: I1213 15:53:36.643934 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8a45be52-033d-46a8-8ad1-8f1fdf02dd74-calico-apiserver-certs\") pod \"calico-apiserver-6dd7c694db-tpndz\" (UID: \"8a45be52-033d-46a8-8ad1-8f1fdf02dd74\") " pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" Dec 13 15:53:36.644233 kubelet[2787]: I1213 15:53:36.643998 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bkn69\" (UniqueName: \"kubernetes.io/projected/8a45be52-033d-46a8-8ad1-8f1fdf02dd74-kube-api-access-bkn69\") pod \"calico-apiserver-6dd7c694db-tpndz\" (UID: \"8a45be52-033d-46a8-8ad1-8f1fdf02dd74\") " pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" Dec 13 15:53:36.644233 kubelet[2787]: I1213 15:53:36.644060 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8779ad05-9879-42e8-a691-1ed0ef8805f1-config-volume\") pod \"coredns-76f75df574-75hcb\" (UID: \"8779ad05-9879-42e8-a691-1ed0ef8805f1\") " pod="kube-system/coredns-76f75df574-75hcb" Dec 13 15:53:36.644233 kubelet[2787]: I1213 15:53:36.644200 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2s7rp\" (UniqueName: \"kubernetes.io/projected/fe2393e8-3242-44fa-9d23-977e3f63201d-kube-api-access-2s7rp\") pod \"calico-apiserver-6dd7c694db-csnsm\" (UID: \"fe2393e8-3242-44fa-9d23-977e3f63201d\") " pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" Dec 13 15:53:36.644659 kubelet[2787]: I1213 15:53:36.644322 2787 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-44l5l\" (UniqueName: \"kubernetes.io/projected/8779ad05-9879-42e8-a691-1ed0ef8805f1-kube-api-access-44l5l\") pod \"coredns-76f75df574-75hcb\" (UID: \"8779ad05-9879-42e8-a691-1ed0ef8805f1\") " pod="kube-system/coredns-76f75df574-75hcb" Dec 13 15:53:36.770590 env[1651]: time="2024-12-13T15:53:36.770482407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nzrw8,Uid:2e8d2123-8a9b-4013-bb94-627070fe5c90,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:36.773752 env[1651]: time="2024-12-13T15:53:36.773670124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-75hcb,Uid:8779ad05-9879-42e8-a691-1ed0ef8805f1,Namespace:kube-system,Attempt:0,}" Dec 13 15:53:36.775789 env[1651]: time="2024-12-13T15:53:36.775723893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-tpndz,Uid:8a45be52-033d-46a8-8ad1-8f1fdf02dd74,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:53:36.777893 env[1651]: time="2024-12-13T15:53:36.777810950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cb4d6b588-tpzhl,Uid:a6cc89e0-6b80-465a-a3f6-12a073cbec84,Namespace:calico-system,Attempt:0,}" Dec 13 15:53:36.780796 env[1651]: time="2024-12-13T15:53:36.780733376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-csnsm,Uid:fe2393e8-3242-44fa-9d23-977e3f63201d,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:53:37.101077 env[1651]: time="2024-12-13T15:53:37.100982579Z" level=info msg="shim disconnected" id=63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35 Dec 13 15:53:37.101450 env[1651]: time="2024-12-13T15:53:37.101083922Z" level=warning msg="cleaning up after shim disconnected" id=63c5e2ca5f773a727900cc122e313ab7821a0cafd82c1e8fae09781e3096fb35 namespace=k8s.io Dec 13 15:53:37.101450 env[1651]: time="2024-12-13T15:53:37.101111718Z" level=info msg="cleaning up dead shim" Dec 13 15:53:37.117391 env[1651]: time="2024-12-13T15:53:37.117300436Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:53:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3578 runtime=io.containerd.runc.v2\n" Dec 13 15:53:37.150290 env[1651]: time="2024-12-13T15:53:37.150239440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:53:37.180224 env[1651]: time="2024-12-13T15:53:37.180152517Z" level=error msg="Failed to destroy network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180445 env[1651]: time="2024-12-13T15:53:37.180213403Z" level=error msg="Failed to destroy network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180550 env[1651]: time="2024-12-13T15:53:37.180525772Z" level=error msg="encountered an error cleaning up failed sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180607 env[1651]: time="2024-12-13T15:53:37.180545883Z" level=error msg="encountered an error cleaning up failed sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180607 env[1651]: time="2024-12-13T15:53:37.180587965Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-75hcb,Uid:8779ad05-9879-42e8-a691-1ed0ef8805f1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180607 env[1651]: time="2024-12-13T15:53:37.180590398Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cb4d6b588-tpzhl,Uid:a6cc89e0-6b80-465a-a3f6-12a073cbec84,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.180914 kubelet[2787]: E1213 15:53:37.180900 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181188 kubelet[2787]: E1213 15:53:37.180967 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" Dec 13 15:53:37.181188 kubelet[2787]: E1213 15:53:37.180900 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181188 kubelet[2787]: E1213 15:53:37.180992 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" Dec 13 15:53:37.181188 kubelet[2787]: E1213 15:53:37.181002 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-75hcb" Dec 13 15:53:37.181277 kubelet[2787]: E1213 15:53:37.181018 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-75hcb" Dec 13 15:53:37.181277 kubelet[2787]: E1213 15:53:37.181046 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5cb4d6b588-tpzhl_calico-system(a6cc89e0-6b80-465a-a3f6-12a073cbec84)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5cb4d6b588-tpzhl_calico-system(a6cc89e0-6b80-465a-a3f6-12a073cbec84)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" podUID="a6cc89e0-6b80-465a-a3f6-12a073cbec84" Dec 13 15:53:37.181277 kubelet[2787]: E1213 15:53:37.181048 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-75hcb_kube-system(8779ad05-9879-42e8-a691-1ed0ef8805f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-75hcb_kube-system(8779ad05-9879-42e8-a691-1ed0ef8805f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-75hcb" podUID="8779ad05-9879-42e8-a691-1ed0ef8805f1" Dec 13 15:53:37.181402 env[1651]: time="2024-12-13T15:53:37.181379620Z" level=error msg="Failed to destroy network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181464 env[1651]: time="2024-12-13T15:53:37.181378470Z" level=error msg="Failed to destroy network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181656 env[1651]: time="2024-12-13T15:53:37.181611546Z" level=error msg="encountered an error cleaning up failed sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181656 env[1651]: time="2024-12-13T15:53:37.181634544Z" level=error msg="encountered an error cleaning up failed sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181711 env[1651]: time="2024-12-13T15:53:37.181642550Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-tpndz,Uid:8a45be52-033d-46a8-8ad1-8f1fdf02dd74,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181711 env[1651]: time="2024-12-13T15:53:37.181663437Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-csnsm,Uid:fe2393e8-3242-44fa-9d23-977e3f63201d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181781 kubelet[2787]: E1213 15:53:37.181761 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181810 kubelet[2787]: E1213 15:53:37.181789 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" Dec 13 15:53:37.181810 kubelet[2787]: E1213 15:53:37.181797 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181810 kubelet[2787]: E1213 15:53:37.181809 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" Dec 13 15:53:37.181886 kubelet[2787]: E1213 15:53:37.181823 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" Dec 13 15:53:37.181886 kubelet[2787]: E1213 15:53:37.181841 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" Dec 13 15:53:37.181886 kubelet[2787]: E1213 15:53:37.181844 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6dd7c694db-csnsm_calico-apiserver(fe2393e8-3242-44fa-9d23-977e3f63201d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6dd7c694db-csnsm_calico-apiserver(fe2393e8-3242-44fa-9d23-977e3f63201d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" podUID="fe2393e8-3242-44fa-9d23-977e3f63201d" Dec 13 15:53:37.181967 env[1651]: time="2024-12-13T15:53:37.181806728Z" level=error msg="Failed to destroy network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.181992 kubelet[2787]: E1213 15:53:37.181885 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6dd7c694db-tpndz_calico-apiserver(8a45be52-033d-46a8-8ad1-8f1fdf02dd74)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6dd7c694db-tpndz_calico-apiserver(8a45be52-033d-46a8-8ad1-8f1fdf02dd74)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" podUID="8a45be52-033d-46a8-8ad1-8f1fdf02dd74" Dec 13 15:53:37.182030 env[1651]: time="2024-12-13T15:53:37.181978618Z" level=error msg="encountered an error cleaning up failed sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.182030 env[1651]: time="2024-12-13T15:53:37.181999736Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nzrw8,Uid:2e8d2123-8a9b-4013-bb94-627070fe5c90,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.182078 kubelet[2787]: E1213 15:53:37.182071 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:37.182105 kubelet[2787]: E1213 15:53:37.182090 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-nzrw8" Dec 13 15:53:37.182105 kubelet[2787]: E1213 15:53:37.182101 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-nzrw8" Dec 13 15:53:37.182148 kubelet[2787]: E1213 15:53:37.182122 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-nzrw8_kube-system(2e8d2123-8a9b-4013-bb94-627070fe5c90)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-nzrw8_kube-system(2e8d2123-8a9b-4013-bb94-627070fe5c90)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-nzrw8" podUID="2e8d2123-8a9b-4013-bb94-627070fe5c90" Dec 13 15:53:37.754041 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658-shm.mount: Deactivated successfully. Dec 13 15:53:37.754142 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247-shm.mount: Deactivated successfully. Dec 13 15:53:37.754220 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0-shm.mount: Deactivated successfully. Dec 13 15:53:37.754290 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f-shm.mount: Deactivated successfully. Dec 13 15:53:37.754359 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8-shm.mount: Deactivated successfully. Dec 13 15:53:37.834025 kubelet[2787]: I1213 15:53:37.833979 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:37.865000 audit[3822]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:37.897915 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:53:37.898009 kernel: audit: type=1325 audit(1734105217.865:272): table=filter:93 family=2 entries=17 op=nft_register_rule pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:37.865000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca2ae0630 a2=0 a3=7ffca2ae061c items=0 ppid=3027 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:37.957521 kernel: audit: type=1300 audit(1734105217.865:272): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca2ae0630 a2=0 a3=7ffca2ae061c items=0 ppid=3027 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:37.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:38.071356 env[1651]: time="2024-12-13T15:53:38.071306070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5jjgl,Uid:80375860-a9a0-4c6e-a9be-55cca33b4166,Namespace:calico-system,Attempt:0,}" Dec 13 15:53:38.112973 kernel: audit: type=1327 audit(1734105217.865:272): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:38.113000 audit[3822]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:38.125441 env[1651]: time="2024-12-13T15:53:38.125410048Z" level=error msg="Failed to destroy network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.126975 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26-shm.mount: Deactivated successfully. Dec 13 15:53:38.150258 kubelet[2787]: I1213 15:53:38.150246 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:38.150568 env[1651]: time="2024-12-13T15:53:38.150551946Z" level=info msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" Dec 13 15:53:38.150853 kubelet[2787]: I1213 15:53:38.150845 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:38.151109 env[1651]: time="2024-12-13T15:53:38.151096003Z" level=info msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" Dec 13 15:53:38.151341 kubelet[2787]: I1213 15:53:38.151330 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:38.151591 env[1651]: time="2024-12-13T15:53:38.151576672Z" level=info msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" Dec 13 15:53:38.151740 kubelet[2787]: I1213 15:53:38.151732 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:38.151957 env[1651]: time="2024-12-13T15:53:38.151937630Z" level=info msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" Dec 13 15:53:38.152216 kubelet[2787]: I1213 15:53:38.152206 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:38.152634 env[1651]: time="2024-12-13T15:53:38.152606555Z" level=info msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" Dec 13 15:53:38.170532 env[1651]: time="2024-12-13T15:53:38.170452643Z" level=error msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" failed" error="failed to destroy network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.170714 env[1651]: time="2024-12-13T15:53:38.170615665Z" level=error msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" failed" error="failed to destroy network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.170757 kubelet[2787]: E1213 15:53:38.170709 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:38.170802 kubelet[2787]: E1213 15:53:38.170767 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658"} Dec 13 15:53:38.170802 kubelet[2787]: E1213 15:53:38.170709 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:38.170802 kubelet[2787]: E1213 15:53:38.170794 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe2393e8-3242-44fa-9d23-977e3f63201d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:38.170802 kubelet[2787]: E1213 15:53:38.170800 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8"} Dec 13 15:53:38.170963 env[1651]: time="2024-12-13T15:53:38.170747555Z" level=error msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" failed" error="failed to destroy network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.171000 kubelet[2787]: E1213 15:53:38.170821 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe2393e8-3242-44fa-9d23-977e3f63201d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" podUID="fe2393e8-3242-44fa-9d23-977e3f63201d" Dec 13 15:53:38.171000 kubelet[2787]: E1213 15:53:38.170821 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8779ad05-9879-42e8-a691-1ed0ef8805f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:38.171000 kubelet[2787]: E1213 15:53:38.170831 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:38.171137 kubelet[2787]: E1213 15:53:38.170838 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8779ad05-9879-42e8-a691-1ed0ef8805f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-75hcb" podUID="8779ad05-9879-42e8-a691-1ed0ef8805f1" Dec 13 15:53:38.171137 kubelet[2787]: E1213 15:53:38.170847 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0"} Dec 13 15:53:38.171137 kubelet[2787]: E1213 15:53:38.170868 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8a45be52-033d-46a8-8ad1-8f1fdf02dd74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:38.171137 kubelet[2787]: E1213 15:53:38.170881 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8a45be52-033d-46a8-8ad1-8f1fdf02dd74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" podUID="8a45be52-033d-46a8-8ad1-8f1fdf02dd74" Dec 13 15:53:38.173220 env[1651]: time="2024-12-13T15:53:38.173199878Z" level=error msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" failed" error="failed to destroy network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.173332 kubelet[2787]: E1213 15:53:38.173324 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:38.173360 kubelet[2787]: E1213 15:53:38.173339 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f"} Dec 13 15:53:38.173360 kubelet[2787]: E1213 15:53:38.173356 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2e8d2123-8a9b-4013-bb94-627070fe5c90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:38.173413 kubelet[2787]: E1213 15:53:38.173370 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2e8d2123-8a9b-4013-bb94-627070fe5c90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-nzrw8" podUID="2e8d2123-8a9b-4013-bb94-627070fe5c90" Dec 13 15:53:38.113000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffca2ae0630 a2=0 a3=7ffca2ae061c items=0 ppid=3027 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:38.174146 env[1651]: time="2024-12-13T15:53:38.174098196Z" level=error msg="encountered an error cleaning up failed sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.174178 env[1651]: time="2024-12-13T15:53:38.174138027Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5jjgl,Uid:80375860-a9a0-4c6e-a9be-55cca33b4166,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.174228 kubelet[2787]: E1213 15:53:38.174222 2787 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.174261 kubelet[2787]: E1213 15:53:38.174245 2787 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:38.174261 kubelet[2787]: E1213 15:53:38.174257 2787 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5jjgl" Dec 13 15:53:38.174309 kubelet[2787]: E1213 15:53:38.174283 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5jjgl_calico-system(80375860-a9a0-4c6e-a9be-55cca33b4166)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5jjgl_calico-system(80375860-a9a0-4c6e-a9be-55cca33b4166)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:38.174365 env[1651]: time="2024-12-13T15:53:38.174253701Z" level=error msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" failed" error="failed to destroy network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:38.174405 kubelet[2787]: E1213 15:53:38.174344 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:38.174405 kubelet[2787]: E1213 15:53:38.174362 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247"} Dec 13 15:53:38.174405 kubelet[2787]: E1213 15:53:38.174394 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a6cc89e0-6b80-465a-a3f6-12a073cbec84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:38.174493 kubelet[2787]: E1213 15:53:38.174418 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a6cc89e0-6b80-465a-a3f6-12a073cbec84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" podUID="a6cc89e0-6b80-465a-a3f6-12a073cbec84" Dec 13 15:53:38.271702 kernel: audit: type=1325 audit(1734105218.113:273): table=nat:94 family=2 entries=19 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:38.271742 kernel: audit: type=1300 audit(1734105218.113:273): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffca2ae0630 a2=0 a3=7ffca2ae061c items=0 ppid=3027 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:38.271756 kernel: audit: type=1327 audit(1734105218.113:273): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:38.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:39.153495 kubelet[2787]: I1213 15:53:39.153451 2787 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:39.153778 env[1651]: time="2024-12-13T15:53:39.153760348Z" level=info msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" Dec 13 15:53:39.167201 env[1651]: time="2024-12-13T15:53:39.167140405Z" level=error msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" failed" error="failed to destroy network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:53:39.167353 kubelet[2787]: E1213 15:53:39.167342 2787 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:39.167386 kubelet[2787]: E1213 15:53:39.167372 2787 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26"} Dec 13 15:53:39.167408 kubelet[2787]: E1213 15:53:39.167393 2787 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80375860-a9a0-4c6e-a9be-55cca33b4166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:53:39.167450 kubelet[2787]: E1213 15:53:39.167413 2787 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80375860-a9a0-4c6e-a9be-55cca33b4166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5jjgl" podUID="80375860-a9a0-4c6e-a9be-55cca33b4166" Dec 13 15:53:41.435233 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2179626096.mount: Deactivated successfully. Dec 13 15:53:41.457256 env[1651]: time="2024-12-13T15:53:41.457232914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:41.457852 env[1651]: time="2024-12-13T15:53:41.457837998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:41.458480 env[1651]: time="2024-12-13T15:53:41.458468145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:41.459264 env[1651]: time="2024-12-13T15:53:41.459253068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:41.459585 env[1651]: time="2024-12-13T15:53:41.459554528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:53:41.463897 env[1651]: time="2024-12-13T15:53:41.463856002Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:53:41.470715 env[1651]: time="2024-12-13T15:53:41.470689687Z" level=info msg="CreateContainer within sandbox \"d9a74911a98e73cdb521f1e9ae7c65c966870df9ff26383cfeefe0eae50fb9c1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"61d178cfb209fa4480060397ec33accb89ad4b0f421b61ba25963c07185fff63\"" Dec 13 15:53:41.470968 env[1651]: time="2024-12-13T15:53:41.470954391Z" level=info msg="StartContainer for \"61d178cfb209fa4480060397ec33accb89ad4b0f421b61ba25963c07185fff63\"" Dec 13 15:53:41.496119 env[1651]: time="2024-12-13T15:53:41.496091515Z" level=info msg="StartContainer for \"61d178cfb209fa4480060397ec33accb89ad4b0f421b61ba25963c07185fff63\" returns successfully" Dec 13 15:53:41.605005 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:53:41.605070 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:53:42.190511 kubelet[2787]: I1213 15:53:42.190390 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jlr25" podStartSLOduration=1.5811395099999999 podStartE2EDuration="14.190297449s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:28.850575659 +0000 UTC m=+19.855866113" lastFinishedPulling="2024-12-13 15:53:41.459733601 +0000 UTC m=+32.465024052" observedRunningTime="2024-12-13 15:53:42.189002985 +0000 UTC m=+33.194293510" watchObservedRunningTime="2024-12-13 15:53:42.190297449 +0000 UTC m=+33.195587956" Dec 13 15:53:42.793000 audit[4190]: AVC avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=40150 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.793000 audit[4190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe95f81a11 a2=241 a3=1b6 items=1 ppid=4158 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.954951 kernel: audit: type=1400 audit(1734105222.793:274): avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=40150 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.955029 kernel: audit: type=1300 audit(1734105222.793:274): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe95f81a11 a2=241 a3=1b6 items=1 ppid=4158 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.955044 kernel: audit: type=1307 audit(1734105222.793:274): cwd="/etc/service/enabled/bird/log" Dec 13 15:53:42.793000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:53:42.984492 kernel: audit: type=1302 audit(1734105222.793:274): item=0 name="/dev/fd/63" inode=40147 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.793000 audit: PATH item=0 name="/dev/fd/63" inode=40147 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:43.048432 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:53:43.048467 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:53:43.048505 kernel: audit: backlog limit exceeded Dec 13 15:53:43.048524 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:53:43.048536 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:53:43.048549 kernel: audit: backlog limit exceeded Dec 13 15:53:43.048560 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:53:43.048570 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 15:53:43.164261 kubelet[2787]: I1213 15:53:43.164244 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:42.793000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4199]: AVC avc: denied { write } for pid=4199 comm="tee" name="fd" dev="proc" ino=37106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit[4199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc36ffca01 a2=241 a3=1b6 items=1 ppid=4161 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=41162 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4201]: AVC avc: denied { write } for pid=4201 comm="tee" name="fd" dev="proc" ino=39019 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit[4201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd00efaa00 a2=241 a3=1b6 items=1 ppid=4157 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:53:42.794000 audit[4202]: AVC avc: denied { write } for pid=4202 comm="tee" name="fd" dev="proc" ino=24538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=39016 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4203]: AVC avc: denied { write } for pid=4203 comm="tee" name="fd" dev="proc" ino=30449 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit[4202]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe38324a10 a2=241 a3=1b6 items=1 ppid=4159 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=24535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe92142a10 a2=241 a3=1b6 items=1 ppid=4162 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=30446 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4191]: AVC avc: denied { write } for pid=4191 comm="tee" name="fd" dev="proc" ino=26216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit[4191]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7e36da10 a2=241 a3=1b6 items=1 ppid=4156 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=38188 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.794000 audit[4197]: AVC avc: denied { write } for pid=4197 comm="tee" name="fd" dev="proc" ino=40154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:53:42.794000 audit[4197]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff24d7fa12 a2=241 a3=1b6 items=1 ppid=4155 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.794000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:53:42.794000 audit: PATH item=0 name="/dev/fd/63" inode=37103 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:53:42.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.872000 audit: BPF prog-id=10 op=LOAD Dec 13 15:53:42.872000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebe04fd80 a2=98 a3=3 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.872000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:42.954000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:42.954000 audit: BPF prog-id=11 op=LOAD Dec 13 15:53:42.954000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebe04fb60 a2=74 a3=540051 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:42.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.234000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.234000 audit: BPF prog-id=14 op=LOAD Dec 13 15:53:43.234000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebe04f8a0 a2=94 a3=5 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.234000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.254000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffebe04f950 a2=50 a3=1 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffebe04fa70 a2=4 a3=38 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { confidentiality } for pid=4296 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.254000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebe04fac0 a2=94 a3=6 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { confidentiality } for pid=4296 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.254000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebe04f270 a2=94 a3=83 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.254000 audit[4296]: AVC avc: denied { confidentiality } for pid=4296 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.254000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebe04f270 a2=94 a3=83 items=0 ppid=4164 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit: BPF prog-id=15 op=LOAD Dec 13 15:53:43.258000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff89da1330 a2=98 a3=1999999999999999 items=0 ppid=4164 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.258000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:53:43.258000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit: BPF prog-id=16 op=LOAD Dec 13 15:53:43.258000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff89da1210 a2=74 a3=ffff items=0 ppid=4164 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.258000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:53:43.258000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.258000 audit: BPF prog-id=17 op=LOAD Dec 13 15:53:43.258000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff89da1250 a2=40 a3=7fff89da1430 items=0 ppid=4164 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.258000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:53:43.258000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:53:43.280498 systemd-networkd[1392]: vxlan.calico: Link UP Dec 13 15:53:43.280503 systemd-networkd[1392]: vxlan.calico: Gained carrier Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit: BPF prog-id=18 op=LOAD Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe32d53260 a2=98 a3=ffffffff items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit: BPF prog-id=19 op=LOAD Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe32d53070 a2=74 a3=540051 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit: BPF prog-id=20 op=LOAD Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe32d530a0 a2=94 a3=2 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d52f70 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32d52fa0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32d52eb0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d52fc0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d52fa0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d52f90 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d52fc0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32d52fa0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32d52fc0 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32d52f90 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe32d53000 a2=28 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.290000 audit: BPF prog-id=21 op=LOAD Dec 13 15:53:43.290000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe32d52e70 a2=40 a3=0 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.291000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe32d52e60 a2=50 a3=2800 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe32d52e60 a2=50 a3=2800 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit: BPF prog-id=22 op=LOAD Dec 13 15:53:43.291000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe32d52680 a2=94 a3=2 items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.291000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.291000 audit: BPF prog-id=23 op=LOAD Dec 13 15:53:43.291000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe32d52780 a2=94 a3=2d items=0 ppid=4164 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit: BPF prog-id=24 op=LOAD Dec 13 15:53:43.292000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9c21f570 a2=98 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.292000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit: BPF prog-id=25 op=LOAD Dec 13 15:53:43.292000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c21f350 a2=74 a3=540051 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.292000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.292000 audit: BPF prog-id=26 op=LOAD Dec 13 15:53:43.292000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c21f380 a2=94 a3=2 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.292000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit: BPF prog-id=27 op=LOAD Dec 13 15:53:43.373000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c21f240 a2=40 a3=1 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.373000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:53:43.373000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.373000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9c21f310 a2=50 a3=7ffc9c21f3f0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.373000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f250 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c21f280 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c21f190 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f2a0 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f280 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f270 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f2a0 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c21f280 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c21f2a0 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c21f270 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c21f2e0 a2=28 a3=0 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9c21f090 a2=50 a3=1 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit: BPF prog-id=28 op=LOAD Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9c21f090 a2=94 a3=5 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9c21f140 a2=50 a3=1 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9c21f260 a2=4 a3=38 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { confidentiality } for pid=4339 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c21f2b0 a2=94 a3=6 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { confidentiality } for pid=4339 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c21ea60 a2=94 a3=83 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { confidentiality } for pid=4339 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c21ea60 a2=94 a3=83 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c2204a0 a2=10 a3=f1f00800 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c220340 a2=10 a3=3 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c2202e0 a2=10 a3=3 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.380000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:53:43.380000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c2202e0 a2=10 a3=7 items=0 ppid=4164 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:53:43.398000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:53:43.425000 audit[4396]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:43.425000 audit[4396]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe543dbe70 a2=0 a3=7ffe543dbe5c items=0 ppid=4164 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:43.429000 audit[4395]: NETFILTER_CFG table=nat:96 family=2 entries=15 op=nft_register_chain pid=4395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:43.429000 audit[4395]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffedd81ddc0 a2=0 a3=7ffedd81ddac items=0 ppid=4164 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.429000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:43.430000 audit[4399]: NETFILTER_CFG table=filter:97 family=2 entries=39 op=nft_register_chain pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:43.430000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd81d1d590 a2=0 a3=7ffd81d1d57c items=0 ppid=4164 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.430000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:43.432000 audit[4394]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=4394 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:43.432000 audit[4394]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffef512f690 a2=0 a3=7ffef512f67c items=0 ppid=4164 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:43.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:45.230916 systemd-networkd[1392]: vxlan.calico: Gained IPv6LL Dec 13 15:53:49.070800 env[1651]: time="2024-12-13T15:53:49.070771928Z" level=info msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.096 [INFO][4432] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.097 [INFO][4432] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" iface="eth0" netns="/var/run/netns/cni-1bd52a8d-763d-b6a7-af90-83d645bb5382" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.097 [INFO][4432] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" iface="eth0" netns="/var/run/netns/cni-1bd52a8d-763d-b6a7-af90-83d645bb5382" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.097 [INFO][4432] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" iface="eth0" netns="/var/run/netns/cni-1bd52a8d-763d-b6a7-af90-83d645bb5382" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.097 [INFO][4432] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.097 [INFO][4432] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.112 [INFO][4444] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.112 [INFO][4444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.112 [INFO][4444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.117 [WARNING][4444] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.117 [INFO][4444] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.118 [INFO][4444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:49.122101 env[1651]: 2024-12-13 15:53:49.120 [INFO][4432] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:53:49.122839 env[1651]: time="2024-12-13T15:53:49.122181392Z" level=info msg="TearDown network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" successfully" Dec 13 15:53:49.122839 env[1651]: time="2024-12-13T15:53:49.122211047Z" level=info msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" returns successfully" Dec 13 15:53:49.122839 env[1651]: time="2024-12-13T15:53:49.122767219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cb4d6b588-tpzhl,Uid:a6cc89e0-6b80-465a-a3f6-12a073cbec84,Namespace:calico-system,Attempt:1,}" Dec 13 15:53:49.124844 systemd[1]: run-netns-cni\x2d1bd52a8d\x2d763d\x2db6a7\x2daf90\x2d83d645bb5382.mount: Deactivated successfully. Dec 13 15:53:49.215965 systemd-networkd[1392]: cali510d618dbb7: Link UP Dec 13 15:53:49.267550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:53:49.267607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali510d618dbb7: link becomes ready Dec 13 15:53:49.267598 systemd-networkd[1392]: cali510d618dbb7: Gained carrier Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.154 [INFO][4459] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0 calico-kube-controllers-5cb4d6b588- calico-system a6cc89e0-6b80-465a-a3f6-12a073cbec84 771 0 2024-12-13 15:53:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5cb4d6b588 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd calico-kube-controllers-5cb4d6b588-tpzhl eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali510d618dbb7 [] []}} ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.154 [INFO][4459] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.179 [INFO][4481] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" HandleID="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.187 [INFO][4481] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" HandleID="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002899e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"calico-kube-controllers-5cb4d6b588-tpzhl", "timestamp":"2024-12-13 15:53:49.179258257 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.187 [INFO][4481] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.187 [INFO][4481] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.187 [INFO][4481] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.189 [INFO][4481] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.193 [INFO][4481] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.197 [INFO][4481] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.199 [INFO][4481] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.201 [INFO][4481] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.201 [INFO][4481] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.203 [INFO][4481] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85 Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.207 [INFO][4481] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.212 [INFO][4481] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.1/26] block=192.168.6.0/26 handle="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.212 [INFO][4481] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.1/26] handle="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.212 [INFO][4481] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:49.274875 env[1651]: 2024-12-13 15:53:49.212 [INFO][4481] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.1/26] IPv6=[] ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" HandleID="k8s-pod-network.c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.214 [INFO][4459] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0", GenerateName:"calico-kube-controllers-5cb4d6b588-", Namespace:"calico-system", SelfLink:"", UID:"a6cc89e0-6b80-465a-a3f6-12a073cbec84", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cb4d6b588", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"calico-kube-controllers-5cb4d6b588-tpzhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali510d618dbb7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.214 [INFO][4459] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.1/32] ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.214 [INFO][4459] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali510d618dbb7 ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.267 [INFO][4459] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.267 [INFO][4459] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0", GenerateName:"calico-kube-controllers-5cb4d6b588-", Namespace:"calico-system", SelfLink:"", UID:"a6cc89e0-6b80-465a-a3f6-12a073cbec84", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cb4d6b588", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85", Pod:"calico-kube-controllers-5cb4d6b588-tpzhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali510d618dbb7", MAC:"86:5e:0c:9a:16:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:49.275310 env[1651]: 2024-12-13 15:53:49.273 [INFO][4459] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85" Namespace="calico-system" Pod="calico-kube-controllers-5cb4d6b588-tpzhl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:53:49.279000 audit[4520]: NETFILTER_CFG table=filter:99 family=2 entries=34 op=nft_register_chain pid=4520 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:49.280398 env[1651]: time="2024-12-13T15:53:49.280340628Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:49.280398 env[1651]: time="2024-12-13T15:53:49.280363419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:49.280398 env[1651]: time="2024-12-13T15:53:49.280370419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:49.280479 env[1651]: time="2024-12-13T15:53:49.280435155Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85 pid=4524 runtime=io.containerd.runc.v2 Dec 13 15:53:49.303796 kernel: kauditd_printk_skb: 561 callbacks suppressed Dec 13 15:53:49.303845 kernel: audit: type=1325 audit(1734105229.279:358): table=filter:99 family=2 entries=34 op=nft_register_chain pid=4520 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:49.279000 audit[4520]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd4d34e7d0 a2=0 a3=7ffd4d34e7bc items=0 ppid=4164 pid=4520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:49.445033 kernel: audit: type=1300 audit(1734105229.279:358): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd4d34e7d0 a2=0 a3=7ffd4d34e7bc items=0 ppid=4164 pid=4520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:49.445095 kernel: audit: type=1327 audit(1734105229.279:358): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:49.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:49.518375 env[1651]: time="2024-12-13T15:53:49.518348397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cb4d6b588-tpzhl,Uid:a6cc89e0-6b80-465a-a3f6-12a073cbec84,Namespace:calico-system,Attempt:1,} returns sandbox id \"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85\"" Dec 13 15:53:49.519059 env[1651]: time="2024-12-13T15:53:49.519047987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 15:53:50.071475 env[1651]: time="2024-12-13T15:53:50.071369059Z" level=info msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" Dec 13 15:53:50.072546 env[1651]: time="2024-12-13T15:53:50.071691422Z" level=info msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" Dec 13 15:53:50.072546 env[1651]: time="2024-12-13T15:53:50.071885582Z" level=info msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.110 [INFO][4608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.110 [INFO][4608] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" iface="eth0" netns="/var/run/netns/cni-3f424601-ec6d-8f8e-eb22-851e01a9ab08" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.110 [INFO][4608] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" iface="eth0" netns="/var/run/netns/cni-3f424601-ec6d-8f8e-eb22-851e01a9ab08" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.111 [INFO][4608] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" iface="eth0" netns="/var/run/netns/cni-3f424601-ec6d-8f8e-eb22-851e01a9ab08" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.111 [INFO][4608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.111 [INFO][4608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.122 [INFO][4654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.122 [INFO][4654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.122 [INFO][4654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.127 [WARNING][4654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.127 [INFO][4654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.128 [INFO][4654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.129685 env[1651]: 2024-12-13 15:53:50.129 [INFO][4608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:53:50.129963 env[1651]: time="2024-12-13T15:53:50.129741264Z" level=info msg="TearDown network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" successfully" Dec 13 15:53:50.129963 env[1651]: time="2024-12-13T15:53:50.129771914Z" level=info msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" returns successfully" Dec 13 15:53:50.130199 env[1651]: time="2024-12-13T15:53:50.130158498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-csnsm,Uid:fe2393e8-3242-44fa-9d23-977e3f63201d,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:53:50.131536 systemd[1]: run-netns-cni\x2d3f424601\x2dec6d\x2d8f8e\x2deb22\x2d851e01a9ab08.mount: Deactivated successfully. Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.111 [INFO][4606] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.112 [INFO][4606] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" iface="eth0" netns="/var/run/netns/cni-e046cbea-4786-da80-9db8-c5d9300e265b" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.112 [INFO][4606] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" iface="eth0" netns="/var/run/netns/cni-e046cbea-4786-da80-9db8-c5d9300e265b" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.113 [INFO][4606] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" iface="eth0" netns="/var/run/netns/cni-e046cbea-4786-da80-9db8-c5d9300e265b" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.113 [INFO][4606] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.113 [INFO][4606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.123 [INFO][4659] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.123 [INFO][4659] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.128 [INFO][4659] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.132 [WARNING][4659] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.132 [INFO][4659] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.133 [INFO][4659] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.134660 env[1651]: 2024-12-13 15:53:50.134 [INFO][4606] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:53:50.135037 env[1651]: time="2024-12-13T15:53:50.134718781Z" level=info msg="TearDown network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" successfully" Dec 13 15:53:50.135037 env[1651]: time="2024-12-13T15:53:50.134736778Z" level=info msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" returns successfully" Dec 13 15:53:50.135163 env[1651]: time="2024-12-13T15:53:50.135144193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-75hcb,Uid:8779ad05-9879-42e8-a691-1ed0ef8805f1,Namespace:kube-system,Attempt:1,}" Dec 13 15:53:50.138373 systemd[1]: run-netns-cni\x2de046cbea\x2d4786\x2dda80\x2d9db8\x2dc5d9300e265b.mount: Deactivated successfully. Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" iface="eth0" netns="/var/run/netns/cni-b295d2e4-e65c-700e-bcc6-12fc4494544b" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" iface="eth0" netns="/var/run/netns/cni-b295d2e4-e65c-700e-bcc6-12fc4494544b" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" iface="eth0" netns="/var/run/netns/cni-b295d2e4-e65c-700e-bcc6-12fc4494544b" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.113 [INFO][4607] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.124 [INFO][4660] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.124 [INFO][4660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.133 [INFO][4660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.137 [WARNING][4660] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.137 [INFO][4660] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.138 [INFO][4660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.140237 env[1651]: 2024-12-13 15:53:50.139 [INFO][4607] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:53:50.140539 env[1651]: time="2024-12-13T15:53:50.140312644Z" level=info msg="TearDown network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" successfully" Dec 13 15:53:50.140539 env[1651]: time="2024-12-13T15:53:50.140339679Z" level=info msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" returns successfully" Dec 13 15:53:50.140799 env[1651]: time="2024-12-13T15:53:50.140782686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nzrw8,Uid:2e8d2123-8a9b-4013-bb94-627070fe5c90,Namespace:kube-system,Attempt:1,}" Dec 13 15:53:50.195584 systemd-networkd[1392]: calid606584d232: Link UP Dec 13 15:53:50.221506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid606584d232: link becomes ready Dec 13 15:53:50.221674 systemd-networkd[1392]: calid606584d232: Gained carrier Dec 13 15:53:50.221997 systemd-networkd[1392]: cali4f8ded2681d: Link UP Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.154 [INFO][4700] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0 calico-apiserver-6dd7c694db- calico-apiserver fe2393e8-3242-44fa-9d23-977e3f63201d 782 0 2024-12-13 15:53:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dd7c694db projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd calico-apiserver-6dd7c694db-csnsm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid606584d232 [] []}} ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.154 [INFO][4700] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.170 [INFO][4765] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" HandleID="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.176 [INFO][4765] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" HandleID="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f8c80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"calico-apiserver-6dd7c694db-csnsm", "timestamp":"2024-12-13 15:53:50.170520957 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.176 [INFO][4765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.176 [INFO][4765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.177 [INFO][4765] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.178 [INFO][4765] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.180 [INFO][4765] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.183 [INFO][4765] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.185 [INFO][4765] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.186 [INFO][4765] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.186 [INFO][4765] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.187 [INFO][4765] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47 Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.190 [INFO][4765] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.193 [INFO][4765] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.2/26] block=192.168.6.0/26 handle="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.193 [INFO][4765] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.2/26] handle="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.193 [INFO][4765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.238409 env[1651]: 2024-12-13 15:53:50.193 [INFO][4765] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.2/26] IPv6=[] ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" HandleID="k8s-pod-network.950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.194 [INFO][4700] cni-plugin/k8s.go 386: Populated endpoint ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2393e8-3242-44fa-9d23-977e3f63201d", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"calico-apiserver-6dd7c694db-csnsm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid606584d232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.194 [INFO][4700] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.2/32] ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.194 [INFO][4700] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid606584d232 ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.221 [INFO][4700] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.221 [INFO][4700] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2393e8-3242-44fa-9d23-977e3f63201d", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47", Pod:"calico-apiserver-6dd7c694db-csnsm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid606584d232", MAC:"72:35:93:57:95:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.239086 env[1651]: 2024-12-13 15:53:50.237 [INFO][4700] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-csnsm" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:53:50.244725 env[1651]: time="2024-12-13T15:53:50.244688014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:50.244725 env[1651]: time="2024-12-13T15:53:50.244710812Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:50.244725 env[1651]: time="2024-12-13T15:53:50.244719802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:50.244867 env[1651]: time="2024-12-13T15:53:50.244789802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47 pid=4826 runtime=io.containerd.runc.v2 Dec 13 15:53:50.244000 audit[4827]: NETFILTER_CFG table=filter:100 family=2 entries=44 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:50.298192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:53:50.298258 kernel: audit: type=1325 audit(1734105230.244:359): table=filter:100 family=2 entries=44 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:50.298275 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f8ded2681d: link becomes ready Dec 13 15:53:50.298298 kernel: audit: type=1300 audit(1734105230.244:359): arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe7e526cf0 a2=0 a3=7ffe7e526cdc items=0 ppid=4164 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:50.244000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe7e526cf0 a2=0 a3=7ffe7e526cdc items=0 ppid=4164 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:50.323789 systemd-networkd[1392]: cali4f8ded2681d: Gained carrier Dec 13 15:53:50.324423 systemd-networkd[1392]: cali370d273f0e6: Link UP Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.158 [INFO][4715] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0 coredns-76f75df574- kube-system 8779ad05-9879-42e8-a691-1ed0ef8805f1 783 0 2024-12-13 15:53:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd coredns-76f75df574-75hcb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4f8ded2681d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.158 [INFO][4715] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.173 [INFO][4770] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" HandleID="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.178 [INFO][4770] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" HandleID="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000361920), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"coredns-76f75df574-75hcb", "timestamp":"2024-12-13 15:53:50.17307926 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.178 [INFO][4770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.193 [INFO][4770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.193 [INFO][4770] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.195 [INFO][4770] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.198 [INFO][4770] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.201 [INFO][4770] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.202 [INFO][4770] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.203 [INFO][4770] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.203 [INFO][4770] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.204 [INFO][4770] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460 Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.207 [INFO][4770] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.210 [INFO][4770] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.3/26] block=192.168.6.0/26 handle="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.210 [INFO][4770] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.3/26] handle="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.210 [INFO][4770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.334476 env[1651]: 2024-12-13 15:53:50.210 [INFO][4770] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.3/26] IPv6=[] ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" HandleID="k8s-pod-network.6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.211 [INFO][4715] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8779ad05-9879-42e8-a691-1ed0ef8805f1", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"coredns-76f75df574-75hcb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4f8ded2681d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.211 [INFO][4715] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.3/32] ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.211 [INFO][4715] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4f8ded2681d ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.323 [INFO][4715] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.323 [INFO][4715] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8779ad05-9879-42e8-a691-1ed0ef8805f1", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460", Pod:"coredns-76f75df574-75hcb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4f8ded2681d", MAC:"c6:f4:51:ef:76:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.334902 env[1651]: 2024-12-13 15:53:50.330 [INFO][4715] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460" Namespace="kube-system" Pod="coredns-76f75df574-75hcb" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:53:50.339843 env[1651]: time="2024-12-13T15:53:50.339812788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:50.339843 env[1651]: time="2024-12-13T15:53:50.339835267Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:50.339952 env[1651]: time="2024-12-13T15:53:50.339843788Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:50.339952 env[1651]: time="2024-12-13T15:53:50.339936467Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460 pid=4871 runtime=io.containerd.runc.v2 Dec 13 15:53:50.244000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:50.435953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali370d273f0e6: link becomes ready Dec 13 15:53:50.436005 kernel: audit: type=1327 audit(1734105230.244:359): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:50.436303 systemd-networkd[1392]: cali370d273f0e6: Gained carrier Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.161 [INFO][4735] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0 coredns-76f75df574- kube-system 2e8d2123-8a9b-4013-bb94-627070fe5c90 784 0 2024-12-13 15:53:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd coredns-76f75df574-nzrw8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali370d273f0e6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.161 [INFO][4735] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.176 [INFO][4784] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" HandleID="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.181 [INFO][4784] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" HandleID="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003640e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"coredns-76f75df574-nzrw8", "timestamp":"2024-12-13 15:53:50.176910248 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.181 [INFO][4784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.210 [INFO][4784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.210 [INFO][4784] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.211 [INFO][4784] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.214 [INFO][4784] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.217 [INFO][4784] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.218 [INFO][4784] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.219 [INFO][4784] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.219 [INFO][4784] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.220 [INFO][4784] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7 Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.236 [INFO][4784] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.241 [INFO][4784] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.4/26] block=192.168.6.0/26 handle="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.241 [INFO][4784] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.4/26] handle="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.241 [INFO][4784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:50.443083 env[1651]: 2024-12-13 15:53:50.241 [INFO][4784] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.4/26] IPv6=[] ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" HandleID="k8s-pod-network.c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.242 [INFO][4735] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"2e8d2123-8a9b-4013-bb94-627070fe5c90", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"coredns-76f75df574-nzrw8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali370d273f0e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.242 [INFO][4735] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.4/32] ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.242 [INFO][4735] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali370d273f0e6 ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.436 [INFO][4735] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.436 [INFO][4735] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"2e8d2123-8a9b-4013-bb94-627070fe5c90", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7", Pod:"coredns-76f75df574-nzrw8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali370d273f0e6", MAC:"7e:cc:14:c5:e4:f4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:50.443491 env[1651]: 2024-12-13 15:53:50.442 [INFO][4735] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7" Namespace="kube-system" Pod="coredns-76f75df574-nzrw8" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:53:50.448761 env[1651]: time="2024-12-13T15:53:50.448729972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:50.448761 env[1651]: time="2024-12-13T15:53:50.448753259Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:50.448761 env[1651]: time="2024-12-13T15:53:50.448760401Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:50.448886 env[1651]: time="2024-12-13T15:53:50.448826979Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7 pid=4907 runtime=io.containerd.runc.v2 Dec 13 15:53:50.502000 audit[4942]: NETFILTER_CFG table=filter:101 family=2 entries=64 op=nft_register_chain pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:50.508377 env[1651]: time="2024-12-13T15:53:50.508349911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-csnsm,Uid:fe2393e8-3242-44fa-9d23-977e3f63201d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47\"" Dec 13 15:53:50.502000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=35656 a0=3 a1=7fff6f842dd0 a2=0 a3=7fff6f842dbc items=0 ppid=4164 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:50.642146 kernel: audit: type=1325 audit(1734105230.502:360): table=filter:101 family=2 entries=64 op=nft_register_chain pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:50.642186 kernel: audit: type=1300 audit(1734105230.502:360): arch=c000003e syscall=46 success=yes exit=35656 a0=3 a1=7fff6f842dd0 a2=0 a3=7fff6f842dbc items=0 ppid=4164 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:50.642203 kernel: audit: type=1327 audit(1734105230.502:360): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:50.502000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:50.647731 env[1651]: time="2024-12-13T15:53:50.647707973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nzrw8,Uid:2e8d2123-8a9b-4013-bb94-627070fe5c90,Namespace:kube-system,Attempt:1,} returns sandbox id \"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7\"" Dec 13 15:53:50.648984 env[1651]: time="2024-12-13T15:53:50.648967849Z" level=info msg="CreateContainer within sandbox \"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:53:50.672646 systemd-networkd[1392]: cali510d618dbb7: Gained IPv6LL Dec 13 15:53:50.699224 env[1651]: time="2024-12-13T15:53:50.699205655Z" level=info msg="CreateContainer within sandbox \"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3850785afd9ee45780ecf4e3bdcbe5852fd2b456e728947fa330909d89e520cc\"" Dec 13 15:53:50.699441 env[1651]: time="2024-12-13T15:53:50.699426464Z" level=info msg="StartContainer for \"3850785afd9ee45780ecf4e3bdcbe5852fd2b456e728947fa330909d89e520cc\"" Dec 13 15:53:50.703622 env[1651]: time="2024-12-13T15:53:50.703591168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-75hcb,Uid:8779ad05-9879-42e8-a691-1ed0ef8805f1,Namespace:kube-system,Attempt:1,} returns sandbox id \"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460\"" Dec 13 15:53:50.705091 env[1651]: time="2024-12-13T15:53:50.705070138Z" level=info msg="CreateContainer within sandbox \"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:53:50.709345 env[1651]: time="2024-12-13T15:53:50.709319555Z" level=info msg="CreateContainer within sandbox \"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"313d77757eb1eb4f873aeb13f5094f8bf99ca054b948f87bafc14634bbb24df2\"" Dec 13 15:53:50.709598 env[1651]: time="2024-12-13T15:53:50.709561660Z" level=info msg="StartContainer for \"313d77757eb1eb4f873aeb13f5094f8bf99ca054b948f87bafc14634bbb24df2\"" Dec 13 15:53:50.722808 env[1651]: time="2024-12-13T15:53:50.722756501Z" level=info msg="StartContainer for \"3850785afd9ee45780ecf4e3bdcbe5852fd2b456e728947fa330909d89e520cc\" returns successfully" Dec 13 15:53:50.732074 env[1651]: time="2024-12-13T15:53:50.732014282Z" level=info msg="StartContainer for \"313d77757eb1eb4f873aeb13f5094f8bf99ca054b948f87bafc14634bbb24df2\" returns successfully" Dec 13 15:53:51.071747 env[1651]: time="2024-12-13T15:53:51.071615287Z" level=info msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" Dec 13 15:53:51.133608 systemd[1]: run-netns-cni\x2db295d2e4\x2de65c\x2d700e\x2dbcc6\x2d12fc4494544b.mount: Deactivated successfully. Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.137 [INFO][5078] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.138 [INFO][5078] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" iface="eth0" netns="/var/run/netns/cni-b1402c05-443a-ac7a-9c10-de0e50ee6899" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.138 [INFO][5078] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" iface="eth0" netns="/var/run/netns/cni-b1402c05-443a-ac7a-9c10-de0e50ee6899" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.138 [INFO][5078] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" iface="eth0" netns="/var/run/netns/cni-b1402c05-443a-ac7a-9c10-de0e50ee6899" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.138 [INFO][5078] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.138 [INFO][5078] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.148 [INFO][5094] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.148 [INFO][5094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.148 [INFO][5094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.152 [WARNING][5094] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.152 [INFO][5094] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.154 [INFO][5094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:51.155732 env[1651]: 2024-12-13 15:53:51.154 [INFO][5078] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:53:51.156282 env[1651]: time="2024-12-13T15:53:51.155855523Z" level=info msg="TearDown network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" successfully" Dec 13 15:53:51.156282 env[1651]: time="2024-12-13T15:53:51.155879547Z" level=info msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" returns successfully" Dec 13 15:53:51.156413 env[1651]: time="2024-12-13T15:53:51.156400126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-tpndz,Uid:8a45be52-033d-46a8-8ad1-8f1fdf02dd74,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:53:51.158479 systemd[1]: run-netns-cni\x2db1402c05\x2d443a\x2dac7a\x2d9c10\x2dde0e50ee6899.mount: Deactivated successfully. Dec 13 15:53:51.189245 kubelet[2787]: I1213 15:53:51.189222 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-nzrw8" podStartSLOduration=29.18918942 podStartE2EDuration="29.18918942s" podCreationTimestamp="2024-12-13 15:53:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:51.188822405 +0000 UTC m=+42.194112852" watchObservedRunningTime="2024-12-13 15:53:51.18918942 +0000 UTC m=+42.194479871" Dec 13 15:53:51.195000 audit[5151]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=5151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:51.202903 kubelet[2787]: I1213 15:53:51.202859 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-75hcb" podStartSLOduration=29.202798372 podStartE2EDuration="29.202798372s" podCreationTimestamp="2024-12-13 15:53:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:53:51.19586057 +0000 UTC m=+42.201151022" watchObservedRunningTime="2024-12-13 15:53:51.202798372 +0000 UTC m=+42.208088816" Dec 13 15:53:51.239235 systemd-networkd[1392]: calid37cc3dbc28: Link UP Dec 13 15:53:51.195000 audit[5151]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcb05e4630 a2=0 a3=7ffcb05e461c items=0 ppid=3027 pid=5151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:51.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:51.249543 kernel: audit: type=1325 audit(1734105231.195:361): table=filter:102 family=2 entries=16 op=nft_register_rule pid=5151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:51.249576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:53:51.298074 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid37cc3dbc28: link becomes ready Dec 13 15:53:51.298210 systemd-networkd[1392]: calid37cc3dbc28: Gained carrier Dec 13 15:53:51.300000 audit[5151]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=5151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:51.300000 audit[5151]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb05e4630 a2=0 a3=0 items=0 ppid=3027 pid=5151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:51.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.178 [INFO][5108] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0 calico-apiserver-6dd7c694db- calico-apiserver 8a45be52-033d-46a8-8ad1-8f1fdf02dd74 803 0 2024-12-13 15:53:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dd7c694db projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd calico-apiserver-6dd7c694db-tpndz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid37cc3dbc28 [] []}} ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.178 [INFO][5108] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.196 [INFO][5136] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" HandleID="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.202 [INFO][5136] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" HandleID="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c7d80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"calico-apiserver-6dd7c694db-tpndz", "timestamp":"2024-12-13 15:53:51.196480545 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.203 [INFO][5136] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.203 [INFO][5136] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.203 [INFO][5136] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.204 [INFO][5136] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.207 [INFO][5136] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.210 [INFO][5136] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.212 [INFO][5136] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.213 [INFO][5136] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.213 [INFO][5136] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.215 [INFO][5136] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.217 [INFO][5136] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.237 [INFO][5136] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.5/26] block=192.168.6.0/26 handle="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.237 [INFO][5136] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.5/26] handle="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.237 [INFO][5136] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:51.304959 env[1651]: 2024-12-13 15:53:51.237 [INFO][5136] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.5/26] IPv6=[] ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" HandleID="k8s-pod-network.019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.238 [INFO][5108] cni-plugin/k8s.go 386: Populated endpoint ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"8a45be52-033d-46a8-8ad1-8f1fdf02dd74", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"calico-apiserver-6dd7c694db-tpndz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid37cc3dbc28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.238 [INFO][5108] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.5/32] ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.238 [INFO][5108] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid37cc3dbc28 ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.298 [INFO][5108] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.298 [INFO][5108] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"8a45be52-033d-46a8-8ad1-8f1fdf02dd74", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea", Pod:"calico-apiserver-6dd7c694db-tpndz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid37cc3dbc28", MAC:"be:58:aa:5b:90:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:51.305381 env[1651]: 2024-12-13 15:53:51.303 [INFO][5108] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea" Namespace="calico-apiserver" Pod="calico-apiserver-6dd7c694db-tpndz" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:53:51.308000 audit[5170]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=5170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:51.308000 audit[5170]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc0daa52e0 a2=0 a3=7ffc0daa52cc items=0 ppid=3027 pid=5170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:51.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:51.310845 env[1651]: time="2024-12-13T15:53:51.310804869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:51.310845 env[1651]: time="2024-12-13T15:53:51.310832120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:51.310845 env[1651]: time="2024-12-13T15:53:51.310840930Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:51.310939 env[1651]: time="2024-12-13T15:53:51.310917587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea pid=5175 runtime=io.containerd.runc.v2 Dec 13 15:53:51.322000 audit[5170]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=5170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:51.322000 audit[5170]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0daa52e0 a2=0 a3=7ffc0daa52cc items=0 ppid=3027 pid=5170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:51.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:51.322000 audit[5171]: NETFILTER_CFG table=filter:106 family=2 entries=52 op=nft_register_chain pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:51.322000 audit[5171]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7ffd8b0618a0 a2=0 a3=7ffd8b06188c items=0 ppid=4164 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:51.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:51.339479 env[1651]: time="2024-12-13T15:53:51.339448887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dd7c694db-tpndz,Uid:8a45be52-033d-46a8-8ad1-8f1fdf02dd74,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea\"" Dec 13 15:53:51.617638 env[1651]: time="2024-12-13T15:53:51.617538428Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:51.618186 env[1651]: time="2024-12-13T15:53:51.618172506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:51.618747 env[1651]: time="2024-12-13T15:53:51.618736526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:51.619677 env[1651]: time="2024-12-13T15:53:51.619668176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:51.619836 env[1651]: time="2024-12-13T15:53:51.619824143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 15:53:51.620223 env[1651]: time="2024-12-13T15:53:51.620199010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:53:51.623952 env[1651]: time="2024-12-13T15:53:51.623904478Z" level=info msg="CreateContainer within sandbox \"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 15:53:51.627772 env[1651]: time="2024-12-13T15:53:51.627731306Z" level=info msg="CreateContainer within sandbox \"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5824eb5c4eec21e3603e8942811de4cea0adaaa2d30271182b17119269ed2260\"" Dec 13 15:53:51.627987 env[1651]: time="2024-12-13T15:53:51.627942068Z" level=info msg="StartContainer for \"5824eb5c4eec21e3603e8942811de4cea0adaaa2d30271182b17119269ed2260\"" Dec 13 15:53:51.661725 env[1651]: time="2024-12-13T15:53:51.661698542Z" level=info msg="StartContainer for \"5824eb5c4eec21e3603e8942811de4cea0adaaa2d30271182b17119269ed2260\" returns successfully" Dec 13 15:53:51.695714 systemd-networkd[1392]: calid606584d232: Gained IPv6LL Dec 13 15:53:51.951001 systemd-networkd[1392]: cali4f8ded2681d: Gained IPv6LL Dec 13 15:53:52.142727 systemd-networkd[1392]: cali370d273f0e6: Gained IPv6LL Dec 13 15:53:52.214423 kubelet[2787]: I1213 15:53:52.214371 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5cb4d6b588-tpzhl" podStartSLOduration=22.11310963 podStartE2EDuration="24.214269325s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:49.518912473 +0000 UTC m=+40.524202916" lastFinishedPulling="2024-12-13 15:53:51.620072157 +0000 UTC m=+42.625362611" observedRunningTime="2024-12-13 15:53:52.213472553 +0000 UTC m=+43.218763116" watchObservedRunningTime="2024-12-13 15:53:52.214269325 +0000 UTC m=+43.219559823" Dec 13 15:53:52.256000 audit[5258]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=5258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:52.256000 audit[5258]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdcf56f250 a2=0 a3=7ffdcf56f23c items=0 ppid=3027 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:52.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:52.293000 audit[5258]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=5258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:52.293000 audit[5258]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdcf56f250 a2=0 a3=7ffdcf56f23c items=0 ppid=3027 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:52.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:53.038674 systemd-networkd[1392]: calid37cc3dbc28: Gained IPv6LL Dec 13 15:53:53.071979 env[1651]: time="2024-12-13T15:53:53.071879239Z" level=info msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.110 [INFO][5278] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.110 [INFO][5278] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" iface="eth0" netns="/var/run/netns/cni-10d33142-6798-f417-cb1a-3622814c1728" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.111 [INFO][5278] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" iface="eth0" netns="/var/run/netns/cni-10d33142-6798-f417-cb1a-3622814c1728" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.111 [INFO][5278] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" iface="eth0" netns="/var/run/netns/cni-10d33142-6798-f417-cb1a-3622814c1728" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.111 [INFO][5278] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.111 [INFO][5278] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.121 [INFO][5291] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.121 [INFO][5291] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.121 [INFO][5291] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.125 [WARNING][5291] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.125 [INFO][5291] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.126 [INFO][5291] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:53.127894 env[1651]: 2024-12-13 15:53:53.127 [INFO][5278] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:53:53.128342 env[1651]: time="2024-12-13T15:53:53.128020876Z" level=info msg="TearDown network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" successfully" Dec 13 15:53:53.128342 env[1651]: time="2024-12-13T15:53:53.128062359Z" level=info msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" returns successfully" Dec 13 15:53:53.128613 env[1651]: time="2024-12-13T15:53:53.128571945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5jjgl,Uid:80375860-a9a0-4c6e-a9be-55cca33b4166,Namespace:calico-system,Attempt:1,}" Dec 13 15:53:53.130208 systemd[1]: run-netns-cni\x2d10d33142\x2d6798\x2df417\x2dcb1a\x2d3622814c1728.mount: Deactivated successfully. Dec 13 15:53:53.190287 systemd-networkd[1392]: cali6be9b3bd069: Link UP Dec 13 15:53:53.238449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:53:53.238623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6be9b3bd069: link becomes ready Dec 13 15:53:53.238822 systemd-networkd[1392]: cali6be9b3bd069: Gained carrier Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.149 [INFO][5308] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0 csi-node-driver- calico-system 80375860-a9a0-4c6e-a9be-55cca33b4166 834 0 2024-12-13 15:53:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-e7c4cc3cdd csi-node-driver-5jjgl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6be9b3bd069 [] []}} ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.149 [INFO][5308] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.164 [INFO][5330] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" HandleID="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.169 [INFO][5330] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" HandleID="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051060), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-e7c4cc3cdd", "pod":"csi-node-driver-5jjgl", "timestamp":"2024-12-13 15:53:53.16414946 +0000 UTC"}, Hostname:"ci-3510.3.6-a-e7c4cc3cdd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.169 [INFO][5330] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.170 [INFO][5330] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.170 [INFO][5330] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-e7c4cc3cdd' Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.171 [INFO][5330] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.174 [INFO][5330] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.177 [INFO][5330] ipam/ipam.go 489: Trying affinity for 192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.179 [INFO][5330] ipam/ipam.go 155: Attempting to load block cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.180 [INFO][5330] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.0/26 host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.180 [INFO][5330] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.0/26 handle="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.181 [INFO][5330] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24 Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.185 [INFO][5330] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.6.0/26 handle="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.188 [INFO][5330] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.6.6/26] block=192.168.6.0/26 handle="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.188 [INFO][5330] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.6/26] handle="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" host="ci-3510.3.6-a-e7c4cc3cdd" Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.188 [INFO][5330] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:53:53.245837 env[1651]: 2024-12-13 15:53:53.188 [INFO][5330] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.6.6/26] IPv6=[] ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" HandleID="k8s-pod-network.2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.189 [INFO][5308] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80375860-a9a0-4c6e-a9be-55cca33b4166", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"", Pod:"csi-node-driver-5jjgl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.6.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6be9b3bd069", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.189 [INFO][5308] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.6.6/32] ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.189 [INFO][5308] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6be9b3bd069 ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.238 [INFO][5308] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.238 [INFO][5308] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80375860-a9a0-4c6e-a9be-55cca33b4166", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24", Pod:"csi-node-driver-5jjgl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.6.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6be9b3bd069", MAC:"56:10:79:e9:91:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:53:53.246310 env[1651]: 2024-12-13 15:53:53.244 [INFO][5308] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24" Namespace="calico-system" Pod="csi-node-driver-5jjgl" WorkloadEndpoint="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:53:53.252185 env[1651]: time="2024-12-13T15:53:53.252127375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:53:53.252185 env[1651]: time="2024-12-13T15:53:53.252149746Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:53:53.252185 env[1651]: time="2024-12-13T15:53:53.252158887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:53:53.252300 env[1651]: time="2024-12-13T15:53:53.252276166Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24 pid=5383 runtime=io.containerd.runc.v2 Dec 13 15:53:53.251000 audit[5385]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=5385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:53:53.251000 audit[5385]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffe1bdb3d60 a2=0 a3=7ffe1bdb3d4c items=0 ppid=4164 pid=5385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:53.251000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:53:53.269550 env[1651]: time="2024-12-13T15:53:53.269525695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5jjgl,Uid:80375860-a9a0-4c6e-a9be-55cca33b4166,Namespace:calico-system,Attempt:1,} returns sandbox id \"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24\"" Dec 13 15:53:53.691996 env[1651]: time="2024-12-13T15:53:53.691940848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:53.692590 env[1651]: time="2024-12-13T15:53:53.692536243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:53.693242 env[1651]: time="2024-12-13T15:53:53.693210273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:53.694120 env[1651]: time="2024-12-13T15:53:53.694058799Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:53.694460 env[1651]: time="2024-12-13T15:53:53.694413667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:53:53.694947 env[1651]: time="2024-12-13T15:53:53.694933900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:53:53.695868 env[1651]: time="2024-12-13T15:53:53.695824652Z" level=info msg="CreateContainer within sandbox \"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:53:53.699981 env[1651]: time="2024-12-13T15:53:53.699964568Z" level=info msg="CreateContainer within sandbox \"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"57f1e398ed5a4948205432e22b42ab0fed69f9cedaedd13764ff6916c1bec94b\"" Dec 13 15:53:53.700231 env[1651]: time="2024-12-13T15:53:53.700220209Z" level=info msg="StartContainer for \"57f1e398ed5a4948205432e22b42ab0fed69f9cedaedd13764ff6916c1bec94b\"" Dec 13 15:53:53.734585 env[1651]: time="2024-12-13T15:53:53.734474019Z" level=info msg="StartContainer for \"57f1e398ed5a4948205432e22b42ab0fed69f9cedaedd13764ff6916c1bec94b\" returns successfully" Dec 13 15:53:54.076597 env[1651]: time="2024-12-13T15:53:54.076414944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:54.077121 env[1651]: time="2024-12-13T15:53:54.077109945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:54.078168 env[1651]: time="2024-12-13T15:53:54.078156600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:54.078793 env[1651]: time="2024-12-13T15:53:54.078743527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:54.079425 env[1651]: time="2024-12-13T15:53:54.079383682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:53:54.079762 env[1651]: time="2024-12-13T15:53:54.079723431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:53:54.080429 env[1651]: time="2024-12-13T15:53:54.080410330Z" level=info msg="CreateContainer within sandbox \"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:53:54.083977 env[1651]: time="2024-12-13T15:53:54.083916593Z" level=info msg="CreateContainer within sandbox \"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c36fec1cf7d1024770d575ae99f30ddd925fd29872dfeda3c53135bbde8f9202\"" Dec 13 15:53:54.084195 env[1651]: time="2024-12-13T15:53:54.084177394Z" level=info msg="StartContainer for \"c36fec1cf7d1024770d575ae99f30ddd925fd29872dfeda3c53135bbde8f9202\"" Dec 13 15:53:54.119164 env[1651]: time="2024-12-13T15:53:54.119133725Z" level=info msg="StartContainer for \"c36fec1cf7d1024770d575ae99f30ddd925fd29872dfeda3c53135bbde8f9202\" returns successfully" Dec 13 15:53:54.201069 kubelet[2787]: I1213 15:53:54.201011 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dd7c694db-csnsm" podStartSLOduration=23.01514236 podStartE2EDuration="26.200933519s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:50.508898726 +0000 UTC m=+41.514189170" lastFinishedPulling="2024-12-13 15:53:53.694689874 +0000 UTC m=+44.699980329" observedRunningTime="2024-12-13 15:53:54.200676728 +0000 UTC m=+45.205967175" watchObservedRunningTime="2024-12-13 15:53:54.200933519 +0000 UTC m=+45.206223963" Dec 13 15:53:54.207630 kubelet[2787]: I1213 15:53:54.207577 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dd7c694db-tpndz" podStartSLOduration=23.46798901 podStartE2EDuration="26.207528466s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:51.340078173 +0000 UTC m=+42.345368615" lastFinishedPulling="2024-12-13 15:53:54.079617624 +0000 UTC m=+45.084908071" observedRunningTime="2024-12-13 15:53:54.20735103 +0000 UTC m=+45.212641492" watchObservedRunningTime="2024-12-13 15:53:54.207528466 +0000 UTC m=+45.212818914" Dec 13 15:53:54.207000 audit[5525]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=5525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:54.207000 audit[5525]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa1f8e2b0 a2=0 a3=7fffa1f8e29c items=0 ppid=3027 pid=5525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:54.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:54.221000 audit[5525]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=5525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:54.221000 audit[5525]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa1f8e2b0 a2=0 a3=7fffa1f8e29c items=0 ppid=3027 pid=5525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:54.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:54.237000 audit[5527]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=5527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:54.237000 audit[5527]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe35ac9f00 a2=0 a3=7ffe35ac9eec items=0 ppid=3027 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:54.237000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:54.258000 audit[5527]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:53:54.258000 audit[5527]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe35ac9f00 a2=0 a3=7ffe35ac9eec items=0 ppid=3027 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:53:54.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:54.894818 systemd-networkd[1392]: cali6be9b3bd069: Gained IPv6LL Dec 13 15:53:55.197509 kubelet[2787]: I1213 15:53:55.197272 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:55.197509 kubelet[2787]: I1213 15:53:55.197366 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:55.502878 env[1651]: time="2024-12-13T15:53:55.502853998Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:55.503428 env[1651]: time="2024-12-13T15:53:55.503415993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:55.504038 env[1651]: time="2024-12-13T15:53:55.504025859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:55.505010 env[1651]: time="2024-12-13T15:53:55.504996777Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:55.505226 env[1651]: time="2024-12-13T15:53:55.505213609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:53:55.506425 env[1651]: time="2024-12-13T15:53:55.506412482Z" level=info msg="CreateContainer within sandbox \"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:53:55.512273 env[1651]: time="2024-12-13T15:53:55.512231215Z" level=info msg="CreateContainer within sandbox \"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1f68af731af6dcfd7c1389473fb81f06f5e142b8f68e66ef37434c907d01f3e5\"" Dec 13 15:53:55.512484 env[1651]: time="2024-12-13T15:53:55.512472250Z" level=info msg="StartContainer for \"1f68af731af6dcfd7c1389473fb81f06f5e142b8f68e66ef37434c907d01f3e5\"" Dec 13 15:53:55.536793 env[1651]: time="2024-12-13T15:53:55.536764519Z" level=info msg="StartContainer for \"1f68af731af6dcfd7c1389473fb81f06f5e142b8f68e66ef37434c907d01f3e5\" returns successfully" Dec 13 15:53:55.537454 env[1651]: time="2024-12-13T15:53:55.537440652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:53:56.643664 kubelet[2787]: I1213 15:53:56.643579 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:53:57.031176 env[1651]: time="2024-12-13T15:53:57.031122009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:57.031825 env[1651]: time="2024-12-13T15:53:57.031783145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:57.032343 env[1651]: time="2024-12-13T15:53:57.032309924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:57.033137 env[1651]: time="2024-12-13T15:53:57.033104071Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:53:57.033449 env[1651]: time="2024-12-13T15:53:57.033419497Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:53:57.034539 env[1651]: time="2024-12-13T15:53:57.034510127Z" level=info msg="CreateContainer within sandbox \"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:53:57.039621 env[1651]: time="2024-12-13T15:53:57.039546339Z" level=info msg="CreateContainer within sandbox \"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"239733e55bb43a820fb3e6ec5e3d6dc4b95ebaa1e4bc429337c2a8654f11c569\"" Dec 13 15:53:57.039916 env[1651]: time="2024-12-13T15:53:57.039903227Z" level=info msg="StartContainer for \"239733e55bb43a820fb3e6ec5e3d6dc4b95ebaa1e4bc429337c2a8654f11c569\"" Dec 13 15:53:57.065073 env[1651]: time="2024-12-13T15:53:57.065021159Z" level=info msg="StartContainer for \"239733e55bb43a820fb3e6ec5e3d6dc4b95ebaa1e4bc429337c2a8654f11c569\" returns successfully" Dec 13 15:53:57.108653 kubelet[2787]: I1213 15:53:57.108609 2787 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:53:57.108653 kubelet[2787]: I1213 15:53:57.108631 2787 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:53:57.239115 kubelet[2787]: I1213 15:53:57.239044 2787 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5jjgl" podStartSLOduration=25.475358673 podStartE2EDuration="29.238915722s" podCreationTimestamp="2024-12-13 15:53:28 +0000 UTC" firstStartedPulling="2024-12-13 15:53:53.270157423 +0000 UTC m=+44.275447869" lastFinishedPulling="2024-12-13 15:53:57.033714471 +0000 UTC m=+48.039004918" observedRunningTime="2024-12-13 15:53:57.238714009 +0000 UTC m=+48.244004544" watchObservedRunningTime="2024-12-13 15:53:57.238915722 +0000 UTC m=+48.244206263" Dec 13 15:54:09.069378 env[1651]: time="2024-12-13T15:54:09.069302285Z" level=info msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.132 [WARNING][5682] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2393e8-3242-44fa-9d23-977e3f63201d", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47", Pod:"calico-apiserver-6dd7c694db-csnsm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid606584d232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.132 [INFO][5682] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.132 [INFO][5682] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" iface="eth0" netns="" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.132 [INFO][5682] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.132 [INFO][5682] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.145 [INFO][5701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.145 [INFO][5701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.145 [INFO][5701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.149 [WARNING][5701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.149 [INFO][5701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.150 [INFO][5701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.152213 env[1651]: 2024-12-13 15:54:09.151 [INFO][5682] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.152573 env[1651]: time="2024-12-13T15:54:09.152237180Z" level=info msg="TearDown network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" successfully" Dec 13 15:54:09.152573 env[1651]: time="2024-12-13T15:54:09.152261708Z" level=info msg="StopPodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" returns successfully" Dec 13 15:54:09.152664 env[1651]: time="2024-12-13T15:54:09.152609780Z" level=info msg="RemovePodSandbox for \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" Dec 13 15:54:09.152664 env[1651]: time="2024-12-13T15:54:09.152635027Z" level=info msg="Forcibly stopping sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\"" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.170 [WARNING][5730] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2393e8-3242-44fa-9d23-977e3f63201d", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"950103a6dccd2141957afa2aab7742e922899845dfdc033d285fc7e071be7f47", Pod:"calico-apiserver-6dd7c694db-csnsm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid606584d232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.171 [INFO][5730] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.171 [INFO][5730] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" iface="eth0" netns="" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.171 [INFO][5730] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.171 [INFO][5730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.181 [INFO][5742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.181 [INFO][5742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.181 [INFO][5742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.185 [WARNING][5742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.185 [INFO][5742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" HandleID="k8s-pod-network.7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--csnsm-eth0" Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.186 [INFO][5742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.188000 env[1651]: 2024-12-13 15:54:09.187 [INFO][5730] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658" Dec 13 15:54:09.188000 env[1651]: time="2024-12-13T15:54:09.187976546Z" level=info msg="TearDown network for sandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" successfully" Dec 13 15:54:09.189481 env[1651]: time="2024-12-13T15:54:09.189468180Z" level=info msg="RemovePodSandbox \"7467d7edf74546ac174b4f8b1c4be33c5268bc2c7baf14e51d2c4582394b1658\" returns successfully" Dec 13 15:54:09.189822 env[1651]: time="2024-12-13T15:54:09.189807057Z" level=info msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" Dec 13 15:54:09.198250 kubelet[2787]: I1213 15:54:09.198184 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:54:09.216000 audit[5798]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=5798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.210 [WARNING][5770] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80375860-a9a0-4c6e-a9be-55cca33b4166", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24", Pod:"csi-node-driver-5jjgl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.6.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6be9b3bd069", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.210 [INFO][5770] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.210 [INFO][5770] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" iface="eth0" netns="" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.210 [INFO][5770] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.210 [INFO][5770] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.223 [INFO][5786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.223 [INFO][5786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.223 [INFO][5786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.227 [WARNING][5786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.227 [INFO][5786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.229 [INFO][5786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.230491 env[1651]: 2024-12-13 15:54:09.229 [INFO][5770] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.230491 env[1651]: time="2024-12-13T15:54:09.230476696Z" level=info msg="TearDown network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" successfully" Dec 13 15:54:09.230931 env[1651]: time="2024-12-13T15:54:09.230503298Z" level=info msg="StopPodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" returns successfully" Dec 13 15:54:09.230931 env[1651]: time="2024-12-13T15:54:09.230803516Z" level=info msg="RemovePodSandbox for \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" Dec 13 15:54:09.230931 env[1651]: time="2024-12-13T15:54:09.230832954Z" level=info msg="Forcibly stopping sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\"" Dec 13 15:54:09.240111 kernel: kauditd_printk_skb: 35 callbacks suppressed Dec 13 15:54:09.240228 kernel: audit: type=1325 audit(1734105249.216:373): table=filter:114 family=2 entries=9 op=nft_register_rule pid=5798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.251 [WARNING][5817] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"80375860-a9a0-4c6e-a9be-55cca33b4166", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"2d8bd9dee0138d25c791e7331962b4826bfffd010bd0723821d7aaad34b36f24", Pod:"csi-node-driver-5jjgl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.6.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6be9b3bd069", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.251 [INFO][5817] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.251 [INFO][5817] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" iface="eth0" netns="" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.251 [INFO][5817] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.251 [INFO][5817] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.262 [INFO][5832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.262 [INFO][5832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.262 [INFO][5832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.266 [WARNING][5832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.266 [INFO][5832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" HandleID="k8s-pod-network.2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-csi--node--driver--5jjgl-eth0" Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.267 [INFO][5832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.268837 env[1651]: 2024-12-13 15:54:09.268 [INFO][5817] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26" Dec 13 15:54:09.269159 env[1651]: time="2024-12-13T15:54:09.268848036Z" level=info msg="TearDown network for sandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" successfully" Dec 13 15:54:09.270431 env[1651]: time="2024-12-13T15:54:09.270392189Z" level=info msg="RemovePodSandbox \"2834d03dbadc0b2093debe04aa86cb53634166ab0e6af564f532f8738f772b26\" returns successfully" Dec 13 15:54:09.270717 env[1651]: time="2024-12-13T15:54:09.270671397Z" level=info msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" Dec 13 15:54:09.216000 audit[5798]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0a84e020 a2=0 a3=7ffe0a84e00c items=0 ppid=3027 pid=5798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:09.290498 kernel: audit: type=1300 audit(1734105249.216:373): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0a84e020 a2=0 a3=7ffe0a84e00c items=0 ppid=3027 pid=5798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.288 [WARNING][5862] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0", GenerateName:"calico-kube-controllers-5cb4d6b588-", Namespace:"calico-system", SelfLink:"", UID:"a6cc89e0-6b80-465a-a3f6-12a073cbec84", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cb4d6b588", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85", Pod:"calico-kube-controllers-5cb4d6b588-tpzhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali510d618dbb7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.288 [INFO][5862] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.288 [INFO][5862] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" iface="eth0" netns="" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.288 [INFO][5862] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.288 [INFO][5862] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.298 [INFO][5876] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.298 [INFO][5876] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.298 [INFO][5876] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.301 [WARNING][5876] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.301 [INFO][5876] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.302 [INFO][5876] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.303943 env[1651]: 2024-12-13 15:54:09.303 [INFO][5862] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.304271 env[1651]: time="2024-12-13T15:54:09.303961768Z" level=info msg="TearDown network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" successfully" Dec 13 15:54:09.304271 env[1651]: time="2024-12-13T15:54:09.303982131Z" level=info msg="StopPodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" returns successfully" Dec 13 15:54:09.304312 env[1651]: time="2024-12-13T15:54:09.304275571Z" level=info msg="RemovePodSandbox for \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" Dec 13 15:54:09.304312 env[1651]: time="2024-12-13T15:54:09.304296190Z" level=info msg="Forcibly stopping sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\"" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.322 [WARNING][5905] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0", GenerateName:"calico-kube-controllers-5cb4d6b588-", Namespace:"calico-system", SelfLink:"", UID:"a6cc89e0-6b80-465a-a3f6-12a073cbec84", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cb4d6b588", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c114eba20566382ff622bd960666b1ea7a70de94dfedcc89a510798232fead85", Pod:"calico-kube-controllers-5cb4d6b588-tpzhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali510d618dbb7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.322 [INFO][5905] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.322 [INFO][5905] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" iface="eth0" netns="" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.322 [INFO][5905] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.322 [INFO][5905] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.332 [INFO][5918] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.332 [INFO][5918] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.332 [INFO][5918] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.336 [WARNING][5918] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.336 [INFO][5918] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" HandleID="k8s-pod-network.bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--kube--controllers--5cb4d6b588--tpzhl-eth0" Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.337 [INFO][5918] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.338641 env[1651]: 2024-12-13 15:54:09.338 [INFO][5905] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247" Dec 13 15:54:09.338641 env[1651]: time="2024-12-13T15:54:09.338599474Z" level=info msg="TearDown network for sandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" successfully" Dec 13 15:54:09.340244 env[1651]: time="2024-12-13T15:54:09.340204302Z" level=info msg="RemovePodSandbox \"bfdf68f358fe721b3a9388248e7eaec15b350cb53c21c359adfc873a93025247\" returns successfully" Dec 13 15:54:09.340475 env[1651]: time="2024-12-13T15:54:09.340440295Z" level=info msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" Dec 13 15:54:09.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.368 [WARNING][5945] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"8a45be52-033d-46a8-8ad1-8f1fdf02dd74", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea", Pod:"calico-apiserver-6dd7c694db-tpndz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid37cc3dbc28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.369 [INFO][5945] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.369 [INFO][5945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" iface="eth0" netns="" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.369 [INFO][5945] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.369 [INFO][5945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.379 [INFO][5959] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.379 [INFO][5959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.379 [INFO][5959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.383 [WARNING][5959] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.383 [INFO][5959] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.384 [INFO][5959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.385563 env[1651]: 2024-12-13 15:54:09.384 [INFO][5945] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.385871 env[1651]: time="2024-12-13T15:54:09.385562136Z" level=info msg="TearDown network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" successfully" Dec 13 15:54:09.385871 env[1651]: time="2024-12-13T15:54:09.385591727Z" level=info msg="StopPodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" returns successfully" Dec 13 15:54:09.385959 env[1651]: time="2024-12-13T15:54:09.385908403Z" level=info msg="RemovePodSandbox for \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" Dec 13 15:54:09.385959 env[1651]: time="2024-12-13T15:54:09.385941377Z" level=info msg="Forcibly stopping sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\"" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.403 [WARNING][5987] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0", GenerateName:"calico-apiserver-6dd7c694db-", Namespace:"calico-apiserver", SelfLink:"", UID:"8a45be52-033d-46a8-8ad1-8f1fdf02dd74", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dd7c694db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"019d3ffef23ade5ad3769d3cadcb5731248c91611d96003b20759ca2af9376ea", Pod:"calico-apiserver-6dd7c694db-tpndz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid37cc3dbc28", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.403 [INFO][5987] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.403 [INFO][5987] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" iface="eth0" netns="" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.403 [INFO][5987] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.403 [INFO][5987] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.413 [INFO][6001] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.413 [INFO][6001] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.413 [INFO][6001] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.417 [WARNING][6001] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.417 [INFO][6001] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" HandleID="k8s-pod-network.7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-calico--apiserver--6dd7c694db--tpndz-eth0" Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.418 [INFO][6001] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.419470 env[1651]: 2024-12-13 15:54:09.418 [INFO][5987] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0" Dec 13 15:54:09.419786 env[1651]: time="2024-12-13T15:54:09.419515752Z" level=info msg="TearDown network for sandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" successfully" Dec 13 15:54:09.421790 env[1651]: time="2024-12-13T15:54:09.421745880Z" level=info msg="RemovePodSandbox \"7e25da6446130cd3be34ee6651cfc21eea34e6490e849980c11d437b43c7b4b0\" returns successfully" Dec 13 15:54:09.422117 env[1651]: time="2024-12-13T15:54:09.422066386Z" level=info msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" Dec 13 15:54:09.425564 kernel: audit: type=1327 audit(1734105249.216:373): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:09.425000 audit[5798]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=5798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.439 [WARNING][6030] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8779ad05-9879-42e8-a691-1ed0ef8805f1", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460", Pod:"coredns-76f75df574-75hcb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4f8ded2681d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.440 [INFO][6030] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.440 [INFO][6030] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" iface="eth0" netns="" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.440 [INFO][6030] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.440 [INFO][6030] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.454 [INFO][6044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.454 [INFO][6044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.454 [INFO][6044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.458 [WARNING][6044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.458 [INFO][6044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.459 [INFO][6044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.460505 env[1651]: 2024-12-13 15:54:09.459 [INFO][6030] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.460856 env[1651]: time="2024-12-13T15:54:09.460523708Z" level=info msg="TearDown network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" successfully" Dec 13 15:54:09.460856 env[1651]: time="2024-12-13T15:54:09.460546151Z" level=info msg="StopPodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" returns successfully" Dec 13 15:54:09.460892 env[1651]: time="2024-12-13T15:54:09.460853351Z" level=info msg="RemovePodSandbox for \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" Dec 13 15:54:09.460923 env[1651]: time="2024-12-13T15:54:09.460890361Z" level=info msg="Forcibly stopping sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\"" Dec 13 15:54:09.425000 audit[5798]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe0a84e020 a2=0 a3=7ffe0a84e00c items=0 ppid=3027 pid=5798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.479 [WARNING][6070] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"8779ad05-9879-42e8-a691-1ed0ef8805f1", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"6fee0b7bd403b9c0027fa7735e2d2c38cb4d1d4deee0b9bbe263b367458fa460", Pod:"coredns-76f75df574-75hcb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4f8ded2681d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.479 [INFO][6070] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.479 [INFO][6070] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" iface="eth0" netns="" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.479 [INFO][6070] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.479 [INFO][6070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.489 [INFO][6082] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.489 [INFO][6082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.489 [INFO][6082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.493 [WARNING][6082] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.493 [INFO][6082] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" HandleID="k8s-pod-network.f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--75hcb-eth0" Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.494 [INFO][6082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.495783 env[1651]: 2024-12-13 15:54:09.495 [INFO][6070] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8" Dec 13 15:54:09.496095 env[1651]: time="2024-12-13T15:54:09.495779853Z" level=info msg="TearDown network for sandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" successfully" Dec 13 15:54:09.497593 env[1651]: time="2024-12-13T15:54:09.497542583Z" level=info msg="RemovePodSandbox \"f11da370440225436492003d850c7de49b79fed083d97124adad1fe7e1d6cfb8\" returns successfully" Dec 13 15:54:09.497837 env[1651]: time="2024-12-13T15:54:09.497824249Z" level=info msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.516 [WARNING][6111] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"2e8d2123-8a9b-4013-bb94-627070fe5c90", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7", Pod:"coredns-76f75df574-nzrw8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali370d273f0e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.516 [INFO][6111] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.516 [INFO][6111] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" iface="eth0" netns="" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.516 [INFO][6111] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.516 [INFO][6111] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.525 [INFO][6127] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.525 [INFO][6127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.526 [INFO][6127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.529 [WARNING][6127] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.529 [INFO][6127] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.530 [INFO][6127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.532047 env[1651]: 2024-12-13 15:54:09.531 [INFO][6111] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.532415 env[1651]: time="2024-12-13T15:54:09.532074020Z" level=info msg="TearDown network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" successfully" Dec 13 15:54:09.532415 env[1651]: time="2024-12-13T15:54:09.532098675Z" level=info msg="StopPodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" returns successfully" Dec 13 15:54:09.532453 env[1651]: time="2024-12-13T15:54:09.532424590Z" level=info msg="RemovePodSandbox for \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" Dec 13 15:54:09.532516 env[1651]: time="2024-12-13T15:54:09.532465563Z" level=info msg="Forcibly stopping sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\"" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.550 [WARNING][6154] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"2e8d2123-8a9b-4013-bb94-627070fe5c90", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 53, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-e7c4cc3cdd", ContainerID:"c9b0798e2f67cf51020087fc3be655bbb22fec16c42cb0994c7c7a0c90db79f7", Pod:"coredns-76f75df574-nzrw8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali370d273f0e6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.551 [INFO][6154] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.551 [INFO][6154] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" iface="eth0" netns="" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.551 [INFO][6154] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.551 [INFO][6154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.561 [INFO][6170] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.561 [INFO][6170] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.561 [INFO][6170] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.564 [WARNING][6170] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.565 [INFO][6170] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" HandleID="k8s-pod-network.5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Workload="ci--3510.3.6--a--e7c4cc3cdd-k8s-coredns--76f75df574--nzrw8-eth0" Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.566 [INFO][6170] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:54:09.567405 env[1651]: 2024-12-13 15:54:09.566 [INFO][6154] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f" Dec 13 15:54:09.567727 env[1651]: time="2024-12-13T15:54:09.567415517Z" level=info msg="TearDown network for sandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" successfully" Dec 13 15:54:09.569593 kernel: audit: type=1325 audit(1734105249.425:374): table=nat:115 family=2 entries=27 op=nft_register_chain pid=5798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:09.569631 kernel: audit: type=1300 audit(1734105249.425:374): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe0a84e020 a2=0 a3=7ffe0a84e00c items=0 ppid=3027 pid=5798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:09.569651 kernel: audit: type=1327 audit(1734105249.425:374): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:09.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:09.569698 env[1651]: time="2024-12-13T15:54:09.569636958Z" level=info msg="RemovePodSandbox \"5270c0b20d441879878699c5dbe6aab09bd80f1656994a26c737ca08b4af233f\" returns successfully" Dec 13 15:54:24.720789 kubelet[2787]: I1213 15:54:24.720678 2787 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:54:24.745000 audit[6233]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:24.745000 audit[6233]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0700e4b0 a2=0 a3=7ffd0700e49c items=0 ppid=3027 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:24.895617 kernel: audit: type=1325 audit(1734105264.745:375): table=filter:116 family=2 entries=8 op=nft_register_rule pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:24.895654 kernel: audit: type=1300 audit(1734105264.745:375): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0700e4b0 a2=0 a3=7ffd0700e49c items=0 ppid=3027 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:24.895671 kernel: audit: type=1327 audit(1734105264.745:375): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:24.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:24.957000 audit[6233]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:25.014552 kernel: audit: type=1325 audit(1734105264.957:376): table=nat:117 family=2 entries=34 op=nft_register_chain pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:54:25.014596 kernel: audit: type=1300 audit(1734105264.957:376): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0700e4b0 a2=0 a3=7ffd0700e49c items=0 ppid=3027 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:24.957000 audit[6233]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0700e4b0 a2=0 a3=7ffd0700e49c items=0 ppid=3027 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:54:24.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:54:25.167550 kernel: audit: type=1327 audit(1734105264.957:376): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:56:48.893698 systemd[1]: Started sshd@9-147.75.203.63:22-218.92.0.226:49794.service. Dec 13 15:56:48.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.63:22-218.92.0.226:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:48.982571 kernel: audit: type=1130 audit(1734105408.892:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.63:22-218.92.0.226:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:56:57.214817 sshd[6532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.226 user=root Dec 13 15:56:57.213000 audit[6532]: USER_AUTH pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:56:57.310679 kernel: audit: type=1100 audit(1734105417.213:378): pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:56:58.954707 sshd[6532]: Failed password for root from 218.92.0.226 port 49794 ssh2 Dec 13 15:56:59.193000 audit[6532]: USER_AUTH pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:56:59.290553 kernel: audit: type=1100 audit(1734105419.193:379): pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:00.879777 sshd[6532]: Failed password for root from 218.92.0.226 port 49794 ssh2 Dec 13 15:57:01.174000 audit[6532]: USER_AUTH pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:01.263635 kernel: audit: type=1100 audit(1734105421.174:380): pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:03.135534 sshd[6532]: Failed password for root from 218.92.0.226 port 49794 ssh2 Dec 13 15:57:07.222333 systemd[1]: Started sshd@10-147.75.203.63:22-218.92.0.226:17068.service. Dec 13 15:57:07.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.63:22-218.92.0.226:17068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:07.311569 kernel: audit: type=1130 audit(1734105427.220:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.63:22-218.92.0.226:17068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:18.979973 systemd[1]: Started sshd@11-147.75.203.63:22-218.92.0.226:11060.service. Dec 13 15:57:18.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.63:22-218.92.0.226:11060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:19.072495 kernel: audit: type=1130 audit(1734105438.979:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.63:22-218.92.0.226:11060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:25.795629 sshd[6627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.226 user=root Dec 13 15:57:25.795000 audit[6627]: USER_AUTH pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:25.888729 kernel: audit: type=1100 audit(1734105445.795:383): pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:28.051218 sshd[6627]: Failed password for root from 218.92.0.226 port 11060 ssh2 Dec 13 15:57:29.566000 audit[6627]: ANOM_LOGIN_FAILURES pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:29.567359 sshd[6627]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 15:57:29.567000 audit[6627]: USER_AUTH pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:29.725730 kernel: audit: type=2100 audit(1734105449.566:384): pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:29.725789 kernel: audit: type=1100 audit(1734105449.567:385): pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:31.036245 sshd[6627]: Failed password for root from 218.92.0.226 port 11060 ssh2 Dec 13 15:57:31.544000 audit[6627]: USER_AUTH pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:31.637535 kernel: audit: type=1100 audit(1734105451.544:386): pid=6627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:33.289813 sshd[6627]: Failed password for root from 218.92.0.226 port 11060 ssh2 Dec 13 15:57:33.528739 sshd[6627]: Received disconnect from 218.92.0.226 port 11060:11: [preauth] Dec 13 15:57:33.528739 sshd[6627]: Disconnected from authenticating user root 218.92.0.226 port 11060 [preauth] Dec 13 15:57:33.529290 sshd[6627]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.226 user=root Dec 13 15:57:33.531283 systemd[1]: sshd@11-147.75.203.63:22-218.92.0.226:11060.service: Deactivated successfully. Dec 13 15:57:33.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.63:22-218.92.0.226:11060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:33.625685 kernel: audit: type=1131 audit(1734105453.531:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.63:22-218.92.0.226:11060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:36.181030 systemd[1]: Started sshd@12-147.75.203.63:22-218.92.0.226:48188.service. Dec 13 15:57:36.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.63:22-218.92.0.226:48188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:36.274494 kernel: audit: type=1130 audit(1734105456.180:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.63:22-218.92.0.226:48188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:41.722985 sshd[6683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.226 user=root Dec 13 15:57:41.722000 audit[6683]: USER_AUTH pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:41.816549 kernel: audit: type=1100 audit(1734105461.722:389): pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:43.507842 sshd[6683]: Failed password for root from 218.92.0.226 port 48188 ssh2 Dec 13 15:57:44.848000 audit[6683]: USER_AUTH pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:44.946493 kernel: audit: type=1100 audit(1734105464.848:390): pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:47.381253 sshd[6683]: Failed password for root from 218.92.0.226 port 48188 ssh2 Dec 13 15:57:48.652000 audit[6683]: USER_AUTH pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:48.745578 kernel: audit: type=1100 audit(1734105468.652:391): pid=6683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.226 addr=218.92.0.226 terminal=ssh res=failed' Dec 13 15:57:50.397512 sshd[6683]: Failed password for root from 218.92.0.226 port 48188 ssh2 Dec 13 15:57:52.869001 sshd[6683]: Received disconnect from 218.92.0.226 port 48188:11: [preauth] Dec 13 15:57:52.869001 sshd[6683]: Disconnected from authenticating user root 218.92.0.226 port 48188 [preauth] Dec 13 15:57:52.869599 sshd[6683]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.226 user=root Dec 13 15:57:52.871574 systemd[1]: sshd@12-147.75.203.63:22-218.92.0.226:48188.service: Deactivated successfully. Dec 13 15:57:52.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.63:22-218.92.0.226:48188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:52.965609 kernel: audit: type=1131 audit(1734105472.871:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.63:22-218.92.0.226:48188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:49.178075 systemd[1]: sshd@9-147.75.203.63:22-218.92.0.226:49794.service: Deactivated successfully. Dec 13 15:58:49.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.63:22-218.92.0.226:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:49.271575 kernel: audit: type=1131 audit(1734105529.178:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.63:22-218.92.0.226:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:07.229127 systemd[1]: sshd@10-147.75.203.63:22-218.92.0.226:17068.service: Deactivated successfully. Dec 13 15:59:07.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.63:22-218.92.0.226:17068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:07.322590 kernel: audit: type=1131 audit(1734105547.229:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.63:22-218.92.0.226:17068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:14.397266 systemd[1]: Started sshd@13-147.75.203.63:22-139.178.89.65:43740.service. Dec 13 15:59:14.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.63:22-139.178.89.65:43740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:14.490506 kernel: audit: type=1130 audit(1734105554.396:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.63:22-139.178.89.65:43740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:14.513000 audit[6890]: USER_ACCT pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.514581 sshd[6890]: Accepted publickey for core from 139.178.89.65 port 43740 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:14.515833 sshd[6890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:14.518709 systemd-logind[1640]: New session 12 of user core. Dec 13 15:59:14.519175 systemd[1]: Started session-12.scope. Dec 13 15:59:14.515000 audit[6890]: CRED_ACQ pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.700694 kernel: audit: type=1101 audit(1734105554.513:396): pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.700759 kernel: audit: type=1103 audit(1734105554.515:397): pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.700777 kernel: audit: type=1006 audit(1734105554.515:398): pid=6890 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 15:59:14.760632 kernel: audit: type=1300 audit(1734105554.515:398): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda27f8b20 a2=3 a3=0 items=0 ppid=1 pid=6890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:14.515000 audit[6890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda27f8b20 a2=3 a3=0 items=0 ppid=1 pid=6890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:14.761443 sshd[6890]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:14.762851 systemd[1]: sshd@13-147.75.203.63:22-139.178.89.65:43740.service: Deactivated successfully. Dec 13 15:59:14.763462 systemd-logind[1640]: Session 12 logged out. Waiting for processes to exit. Dec 13 15:59:14.763474 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 15:59:14.764082 systemd-logind[1640]: Removed session 12. Dec 13 15:59:14.515000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:14.885917 kernel: audit: type=1327 audit(1734105554.515:398): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:14.885948 kernel: audit: type=1105 audit(1734105554.521:399): pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.521000 audit[6890]: USER_START pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.982336 kernel: audit: type=1103 audit(1734105554.522:400): pid=6893 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.522000 audit[6893]: CRED_ACQ pid=6893 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.761000 audit[6890]: USER_END pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:15.169453 kernel: audit: type=1106 audit(1734105554.761:401): pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:15.169492 kernel: audit: type=1104 audit(1734105554.761:402): pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.761000 audit[6890]: CRED_DISP pid=6890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:14.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.63:22-139.178.89.65:43740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:19.768522 systemd[1]: Started sshd@14-147.75.203.63:22-139.178.89.65:38294.service. Dec 13 15:59:19.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.63:22-139.178.89.65:38294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:19.795798 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:19.795867 kernel: audit: type=1130 audit(1734105559.768:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.63:22-139.178.89.65:38294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:19.910000 audit[6944]: USER_ACCT pid=6944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:19.911600 sshd[6944]: Accepted publickey for core from 139.178.89.65 port 38294 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:19.914915 sshd[6944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:19.922710 systemd-logind[1640]: New session 13 of user core. Dec 13 15:59:19.924434 systemd[1]: Started session-13.scope. Dec 13 15:59:19.913000 audit[6944]: CRED_ACQ pid=6944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.005494 kernel: audit: type=1101 audit(1734105559.910:405): pid=6944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.005525 kernel: audit: type=1103 audit(1734105559.913:406): pid=6944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.009082 sshd[6944]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:20.010567 systemd[1]: sshd@14-147.75.203.63:22-139.178.89.65:38294.service: Deactivated successfully. Dec 13 15:59:20.011199 systemd-logind[1640]: Session 13 logged out. Waiting for processes to exit. Dec 13 15:59:20.011236 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 15:59:20.011685 systemd-logind[1640]: Removed session 13. Dec 13 15:59:20.155555 kernel: audit: type=1006 audit(1734105559.913:407): pid=6944 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 15:59:20.155594 kernel: audit: type=1300 audit(1734105559.913:407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a29f210 a2=3 a3=0 items=0 ppid=1 pid=6944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:19.913000 audit[6944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a29f210 a2=3 a3=0 items=0 ppid=1 pid=6944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:20.248365 kernel: audit: type=1327 audit(1734105559.913:407): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:19.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:20.279082 kernel: audit: type=1105 audit(1734105559.930:408): pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:19.930000 audit[6944]: USER_START pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.374248 kernel: audit: type=1103 audit(1734105559.931:409): pid=6947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:19.931000 audit[6947]: CRED_ACQ pid=6947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.463326 kernel: audit: type=1106 audit(1734105560.009:410): pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.009000 audit[6944]: USER_END pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.558663 kernel: audit: type=1104 audit(1734105560.009:411): pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.009000 audit[6944]: CRED_DISP pid=6944 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:20.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.63:22-139.178.89.65:38294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.016592 systemd[1]: Started sshd@15-147.75.203.63:22-139.178.89.65:38310.service. Dec 13 15:59:25.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.63:22-139.178.89.65:38310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.043397 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:25.043457 kernel: audit: type=1130 audit(1734105565.016:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.63:22-139.178.89.65:38310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.158000 audit[6993]: USER_ACCT pid=6993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.158786 sshd[6993]: Accepted publickey for core from 139.178.89.65 port 38310 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:25.160841 sshd[6993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:25.163450 systemd-logind[1640]: New session 14 of user core. Dec 13 15:59:25.164238 systemd[1]: Started session-14.scope. Dec 13 15:59:25.160000 audit[6993]: CRED_ACQ pid=6993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.250149 sshd[6993]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:25.251724 systemd[1]: Started sshd@16-147.75.203.63:22-139.178.89.65:38320.service. Dec 13 15:59:25.252001 systemd[1]: sshd@15-147.75.203.63:22-139.178.89.65:38310.service: Deactivated successfully. Dec 13 15:59:25.252512 systemd-logind[1640]: Session 14 logged out. Waiting for processes to exit. Dec 13 15:59:25.252561 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 15:59:25.253074 systemd-logind[1640]: Removed session 14. Dec 13 15:59:25.340276 kernel: audit: type=1101 audit(1734105565.158:414): pid=6993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.340340 kernel: audit: type=1103 audit(1734105565.160:415): pid=6993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.340361 kernel: audit: type=1006 audit(1734105565.160:416): pid=6993 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 15:59:25.398861 kernel: audit: type=1300 audit(1734105565.160:416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41553dc0 a2=3 a3=0 items=0 ppid=1 pid=6993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:25.160000 audit[6993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41553dc0 a2=3 a3=0 items=0 ppid=1 pid=6993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:25.423167 sshd[7018]: Accepted publickey for core from 139.178.89.65 port 38320 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:25.424802 sshd[7018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:25.427374 systemd-logind[1640]: New session 15 of user core. Dec 13 15:59:25.427860 systemd[1]: Started session-15.scope. Dec 13 15:59:25.490936 kernel: audit: type=1327 audit(1734105565.160:416): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:25.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:25.521366 kernel: audit: type=1105 audit(1734105565.166:417): pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.166000 audit[6993]: USER_START pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.523106 sshd[7018]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:25.524547 systemd[1]: Started sshd@17-147.75.203.63:22-139.178.89.65:38328.service. Dec 13 15:59:25.524909 systemd[1]: sshd@16-147.75.203.63:22-139.178.89.65:38320.service: Deactivated successfully. Dec 13 15:59:25.525425 systemd-logind[1640]: Session 15 logged out. Waiting for processes to exit. Dec 13 15:59:25.525472 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 15:59:25.525999 systemd-logind[1640]: Removed session 15. Dec 13 15:59:25.615679 kernel: audit: type=1103 audit(1734105565.167:418): pid=6996 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.167000 audit[6996]: CRED_ACQ pid=6996 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.250000 audit[6993]: USER_END pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.729332 sshd[7042]: Accepted publickey for core from 139.178.89.65 port 38328 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:25.730065 sshd[7042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:25.732743 systemd-logind[1640]: New session 16 of user core. Dec 13 15:59:25.733318 systemd[1]: Started session-16.scope. Dec 13 15:59:25.800302 kernel: audit: type=1106 audit(1734105565.250:419): pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.800555 kernel: audit: type=1104 audit(1734105565.250:420): pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.250000 audit[6993]: CRED_DISP pid=6993 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.814513 sshd[7042]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:25.815918 systemd[1]: sshd@17-147.75.203.63:22-139.178.89.65:38328.service: Deactivated successfully. Dec 13 15:59:25.816490 systemd-logind[1640]: Session 16 logged out. Waiting for processes to exit. Dec 13 15:59:25.816519 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 15:59:25.816950 systemd-logind[1640]: Removed session 16. Dec 13 15:59:25.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.63:22-139.178.89.65:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.63:22-139.178.89.65:38310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.422000 audit[7018]: USER_ACCT pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.424000 audit[7018]: CRED_ACQ pid=7018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.424000 audit[7018]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c2ddd50 a2=3 a3=0 items=0 ppid=1 pid=7018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:25.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:25.429000 audit[7018]: USER_START pid=7018 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.430000 audit[7023]: CRED_ACQ pid=7023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.523000 audit[7018]: USER_END pid=7018 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.523000 audit[7018]: CRED_DISP pid=7018 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.63:22-139.178.89.65:38328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.63:22-139.178.89.65:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:25.728000 audit[7042]: USER_ACCT pid=7042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.729000 audit[7042]: CRED_ACQ pid=7042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.729000 audit[7042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff741ddb30 a2=3 a3=0 items=0 ppid=1 pid=7042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:25.729000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:25.735000 audit[7042]: USER_START pid=7042 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.736000 audit[7048]: CRED_ACQ pid=7048 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.814000 audit[7042]: USER_END pid=7042 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.814000 audit[7042]: CRED_DISP pid=7042 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:25.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.63:22-139.178.89.65:38328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:30.817864 systemd[1]: Started sshd@18-147.75.203.63:22-139.178.89.65:44860.service. Dec 13 15:59:30.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.63:22-139.178.89.65:44860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:30.844381 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 15:59:30.844456 kernel: audit: type=1130 audit(1734105570.817:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.63:22-139.178.89.65:44860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:30.957000 audit[7104]: USER_ACCT pid=7104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:30.958763 sshd[7104]: Accepted publickey for core from 139.178.89.65 port 44860 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:30.961553 sshd[7104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:30.969411 systemd-logind[1640]: New session 17 of user core. Dec 13 15:59:30.971435 systemd[1]: Started session-17.scope. Dec 13 15:59:30.960000 audit[7104]: CRED_ACQ pid=7104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.054660 sshd[7104]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:31.056138 systemd[1]: sshd@18-147.75.203.63:22-139.178.89.65:44860.service: Deactivated successfully. Dec 13 15:59:31.056852 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 15:59:31.056867 systemd-logind[1640]: Session 17 logged out. Waiting for processes to exit. Dec 13 15:59:31.057459 systemd-logind[1640]: Removed session 17. Dec 13 15:59:31.142548 kernel: audit: type=1101 audit(1734105570.957:441): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.142592 kernel: audit: type=1103 audit(1734105570.960:442): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.142609 kernel: audit: type=1006 audit(1734105570.960:443): pid=7104 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 15:59:31.201118 kernel: audit: type=1300 audit(1734105570.960:443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40f4b600 a2=3 a3=0 items=0 ppid=1 pid=7104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:30.960000 audit[7104]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40f4b600 a2=3 a3=0 items=0 ppid=1 pid=7104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:31.293318 kernel: audit: type=1327 audit(1734105570.960:443): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:30.960000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:31.323751 kernel: audit: type=1105 audit(1734105570.976:444): pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:30.976000 audit[7104]: USER_START pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.418058 kernel: audit: type=1103 audit(1734105570.976:445): pid=7107 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:30.976000 audit[7107]: CRED_ACQ pid=7107 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.507183 kernel: audit: type=1106 audit(1734105571.051:446): pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.051000 audit[7104]: USER_END pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.602520 kernel: audit: type=1104 audit(1734105571.051:447): pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.051000 audit[7104]: CRED_DISP pid=7104 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:31.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.63:22-139.178.89.65:44860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:36.061086 systemd[1]: Started sshd@19-147.75.203.63:22-139.178.89.65:44876.service. Dec 13 15:59:36.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.63:22-139.178.89.65:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:36.088207 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:36.088292 kernel: audit: type=1130 audit(1734105576.060:449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.63:22-139.178.89.65:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:36.202000 audit[7130]: USER_ACCT pid=7130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.202983 sshd[7130]: Accepted publickey for core from 139.178.89.65 port 44876 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:36.203790 sshd[7130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:36.206181 systemd-logind[1640]: New session 18 of user core. Dec 13 15:59:36.206668 systemd[1]: Started session-18.scope. Dec 13 15:59:36.286392 sshd[7130]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:36.287883 systemd[1]: sshd@19-147.75.203.63:22-139.178.89.65:44876.service: Deactivated successfully. Dec 13 15:59:36.288467 systemd-logind[1640]: Session 18 logged out. Waiting for processes to exit. Dec 13 15:59:36.288507 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 15:59:36.289041 systemd-logind[1640]: Removed session 18. Dec 13 15:59:36.203000 audit[7130]: CRED_ACQ pid=7130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.386224 kernel: audit: type=1101 audit(1734105576.202:450): pid=7130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.386264 kernel: audit: type=1103 audit(1734105576.203:451): pid=7130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.386283 kernel: audit: type=1006 audit(1734105576.203:452): pid=7130 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 15:59:36.444804 kernel: audit: type=1300 audit(1734105576.203:452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91bed070 a2=3 a3=0 items=0 ppid=1 pid=7130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:36.203000 audit[7130]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91bed070 a2=3 a3=0 items=0 ppid=1 pid=7130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:36.536872 kernel: audit: type=1327 audit(1734105576.203:452): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:36.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:36.208000 audit[7130]: USER_START pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.661633 kernel: audit: type=1105 audit(1734105576.208:453): pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.661665 kernel: audit: type=1103 audit(1734105576.208:454): pid=7133 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.208000 audit[7133]: CRED_ACQ pid=7133 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.286000 audit[7130]: USER_END pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.846244 kernel: audit: type=1106 audit(1734105576.286:455): pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.846283 kernel: audit: type=1104 audit(1734105576.286:456): pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.286000 audit[7130]: CRED_DISP pid=7130 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:36.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.63:22-139.178.89.65:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:41.293164 systemd[1]: Started sshd@20-147.75.203.63:22-139.178.89.65:33776.service. Dec 13 15:59:41.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.63:22-139.178.89.65:33776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:41.320246 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:41.320329 kernel: audit: type=1130 audit(1734105581.292:458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.63:22-139.178.89.65:33776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:41.433000 audit[7156]: USER_ACCT pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.434280 sshd[7156]: Accepted publickey for core from 139.178.89.65 port 33776 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:41.435832 sshd[7156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:41.438474 systemd-logind[1640]: New session 19 of user core. Dec 13 15:59:41.438956 systemd[1]: Started session-19.scope. Dec 13 15:59:41.517949 sshd[7156]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:41.519335 systemd[1]: sshd@20-147.75.203.63:22-139.178.89.65:33776.service: Deactivated successfully. Dec 13 15:59:41.519991 systemd-logind[1640]: Session 19 logged out. Waiting for processes to exit. Dec 13 15:59:41.520012 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 15:59:41.520814 systemd-logind[1640]: Removed session 19. Dec 13 15:59:41.435000 audit[7156]: CRED_ACQ pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.615894 kernel: audit: type=1101 audit(1734105581.433:459): pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.615938 kernel: audit: type=1103 audit(1734105581.435:460): pid=7156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.615955 kernel: audit: type=1006 audit(1734105581.435:461): pid=7156 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 15:59:41.674483 kernel: audit: type=1300 audit(1734105581.435:461): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d6e7510 a2=3 a3=0 items=0 ppid=1 pid=7156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:41.435000 audit[7156]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d6e7510 a2=3 a3=0 items=0 ppid=1 pid=7156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:41.766567 kernel: audit: type=1327 audit(1734105581.435:461): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:41.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:41.440000 audit[7156]: USER_START pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.891330 kernel: audit: type=1105 audit(1734105581.440:462): pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.891393 kernel: audit: type=1103 audit(1734105581.441:463): pid=7159 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.441000 audit[7159]: CRED_ACQ pid=7159 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.518000 audit[7156]: USER_END pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:42.075786 kernel: audit: type=1106 audit(1734105581.518:464): pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:42.075822 kernel: audit: type=1104 audit(1734105581.518:465): pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.518000 audit[7156]: CRED_DISP pid=7156 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:41.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.63:22-139.178.89.65:33776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:46.524246 systemd[1]: Started sshd@21-147.75.203.63:22-139.178.89.65:33782.service. Dec 13 15:59:46.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.63:22-139.178.89.65:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:46.550830 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:59:46.550863 kernel: audit: type=1130 audit(1734105586.523:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.63:22-139.178.89.65:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:46.664000 audit[7182]: USER_ACCT pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.665449 sshd[7182]: Accepted publickey for core from 139.178.89.65 port 33782 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:46.667010 sshd[7182]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:46.669503 systemd-logind[1640]: New session 20 of user core. Dec 13 15:59:46.670055 systemd[1]: Started session-20.scope. Dec 13 15:59:46.747581 sshd[7182]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:46.749219 systemd[1]: Started sshd@22-147.75.203.63:22-139.178.89.65:33790.service. Dec 13 15:59:46.749546 systemd[1]: sshd@21-147.75.203.63:22-139.178.89.65:33782.service: Deactivated successfully. Dec 13 15:59:46.750075 systemd-logind[1640]: Session 20 logged out. Waiting for processes to exit. Dec 13 15:59:46.750093 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 15:59:46.751012 systemd-logind[1640]: Removed session 20. Dec 13 15:59:46.666000 audit[7182]: CRED_ACQ pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.846881 kernel: audit: type=1101 audit(1734105586.664:468): pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.846927 kernel: audit: type=1103 audit(1734105586.666:469): pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.846945 kernel: audit: type=1006 audit(1734105586.666:470): pid=7182 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 15:59:46.905451 kernel: audit: type=1300 audit(1734105586.666:470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4ccd4f0 a2=3 a3=0 items=0 ppid=1 pid=7182 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:46.666000 audit[7182]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4ccd4f0 a2=3 a3=0 items=0 ppid=1 pid=7182 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:46.929831 sshd[7206]: Accepted publickey for core from 139.178.89.65 port 33790 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:46.931128 sshd[7206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:46.933334 systemd-logind[1640]: New session 21 of user core. Dec 13 15:59:46.933799 systemd[1]: Started session-21.scope. Dec 13 15:59:46.997597 kernel: audit: type=1327 audit(1734105586.666:470): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:46.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:47.028050 kernel: audit: type=1105 audit(1734105586.671:471): pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.671000 audit[7182]: USER_START pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.032785 sshd[7206]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:47.034864 systemd[1]: Started sshd@23-147.75.203.63:22-139.178.89.65:33798.service. Dec 13 15:59:47.035291 systemd[1]: sshd@22-147.75.203.63:22-139.178.89.65:33790.service: Deactivated successfully. Dec 13 15:59:47.035880 systemd-logind[1640]: Session 21 logged out. Waiting for processes to exit. Dec 13 15:59:47.035920 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 15:59:47.036613 systemd-logind[1640]: Removed session 21. Dec 13 15:59:47.122369 kernel: audit: type=1103 audit(1734105586.672:472): pid=7185 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.672000 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.211362 kernel: audit: type=1106 audit(1734105586.747:473): pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.747000 audit[7182]: USER_END pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.235625 sshd[7230]: Accepted publickey for core from 139.178.89.65 port 33798 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:47.236801 sshd[7230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:47.239069 systemd-logind[1640]: New session 22 of user core. Dec 13 15:59:47.239746 systemd[1]: Started session-22.scope. Dec 13 15:59:46.747000 audit[7182]: CRED_DISP pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.395938 kernel: audit: type=1104 audit(1734105586.747:474): pid=7182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.63:22-139.178.89.65:33790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:46.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.63:22-139.178.89.65:33782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:46.929000 audit[7206]: USER_ACCT pid=7206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.930000 audit[7206]: CRED_ACQ pid=7206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.930000 audit[7206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20793250 a2=3 a3=0 items=0 ppid=1 pid=7206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:46.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:46.935000 audit[7206]: USER_START pid=7206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:46.936000 audit[7210]: CRED_ACQ pid=7210 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.032000 audit[7206]: USER_END pid=7206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.033000 audit[7206]: CRED_DISP pid=7206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.63:22-139.178.89.65:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:47.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.63:22-139.178.89.65:33790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:47.235000 audit[7230]: USER_ACCT pid=7230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.236000 audit[7230]: CRED_ACQ pid=7230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.236000 audit[7230]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff75339360 a2=3 a3=0 items=0 ppid=1 pid=7230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:47.236000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:47.241000 audit[7230]: USER_START pid=7230 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:47.242000 audit[7234]: CRED_ACQ pid=7234 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.462000 audit[7258]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=7258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:48.462000 audit[7258]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd6b1ee000 a2=0 a3=7ffd6b1edfec items=0 ppid=3027 pid=7258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:48.476000 audit[7258]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=7258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:48.476000 audit[7258]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd6b1ee000 a2=0 a3=0 items=0 ppid=3027 pid=7258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:48.487994 sshd[7230]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:48.490000 audit[7230]: USER_END pid=7230 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.490000 audit[7230]: CRED_DISP pid=7230 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.495445 systemd[1]: Started sshd@24-147.75.203.63:22-139.178.89.65:46698.service. Dec 13 15:59:48.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.63:22-139.178.89.65:46698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:48.497549 systemd[1]: sshd@23-147.75.203.63:22-139.178.89.65:33798.service: Deactivated successfully. Dec 13 15:59:48.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.63:22-139.178.89.65:33798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:48.500837 systemd-logind[1640]: Session 22 logged out. Waiting for processes to exit. Dec 13 15:59:48.501045 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 15:59:48.502745 systemd-logind[1640]: Removed session 22. Dec 13 15:59:48.510000 audit[7265]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=7265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:48.510000 audit[7265]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd334af470 a2=0 a3=7ffd334af45c items=0 ppid=3027 pid=7265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:48.519000 audit[7265]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=7265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:48.519000 audit[7265]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd334af470 a2=0 a3=0 items=0 ppid=3027 pid=7265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:48.544000 audit[7261]: USER_ACCT pid=7261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.545367 sshd[7261]: Accepted publickey for core from 139.178.89.65 port 46698 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:48.546000 audit[7261]: CRED_ACQ pid=7261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.546000 audit[7261]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeda12c470 a2=3 a3=0 items=0 ppid=1 pid=7261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:48.547094 sshd[7261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:48.552315 systemd-logind[1640]: New session 23 of user core. Dec 13 15:59:48.553591 systemd[1]: Started session-23.scope. Dec 13 15:59:48.558000 audit[7261]: USER_START pid=7261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.560000 audit[7268]: CRED_ACQ pid=7268 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.733217 sshd[7261]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:48.733000 audit[7261]: USER_END pid=7261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.733000 audit[7261]: CRED_DISP pid=7261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.735099 systemd[1]: Started sshd@25-147.75.203.63:22-139.178.89.65:46712.service. Dec 13 15:59:48.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.63:22-139.178.89.65:46712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:48.735434 systemd[1]: sshd@24-147.75.203.63:22-139.178.89.65:46698.service: Deactivated successfully. Dec 13 15:59:48.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.63:22-139.178.89.65:46698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:48.736050 systemd-logind[1640]: Session 23 logged out. Waiting for processes to exit. Dec 13 15:59:48.736102 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 15:59:48.736471 systemd-logind[1640]: Removed session 23. Dec 13 15:59:48.765000 audit[7288]: USER_ACCT pid=7288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.766345 sshd[7288]: Accepted publickey for core from 139.178.89.65 port 46712 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:48.767000 audit[7288]: CRED_ACQ pid=7288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.768000 audit[7288]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd757f3660 a2=3 a3=0 items=0 ppid=1 pid=7288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:48.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:48.769384 sshd[7288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:48.779436 systemd-logind[1640]: New session 24 of user core. Dec 13 15:59:48.781619 systemd[1]: Started session-24.scope. Dec 13 15:59:48.795000 audit[7288]: USER_START pid=7288 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.798000 audit[7293]: CRED_ACQ pid=7293 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.934813 sshd[7288]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:48.935000 audit[7288]: USER_END pid=7288 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.935000 audit[7288]: CRED_DISP pid=7288 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:48.936324 systemd[1]: sshd@25-147.75.203.63:22-139.178.89.65:46712.service: Deactivated successfully. Dec 13 15:59:48.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.63:22-139.178.89.65:46712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:48.936987 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 15:59:48.936991 systemd-logind[1640]: Session 24 logged out. Waiting for processes to exit. Dec 13 15:59:48.937449 systemd-logind[1640]: Removed session 24. Dec 13 15:59:53.932000 audit[7341]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=7341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:53.944940 systemd[1]: Started sshd@26-147.75.203.63:22-139.178.89.65:46728.service. Dec 13 15:59:53.968662 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 15:59:53.968763 kernel: audit: type=1325 audit(1734105593.932:516): table=filter:122 family=2 entries=20 op=nft_register_rule pid=7341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:53.995552 sshd[7342]: Accepted publickey for core from 139.178.89.65 port 46728 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:53.996606 sshd[7342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:53.999225 systemd-logind[1640]: New session 25 of user core. Dec 13 15:59:53.999670 systemd[1]: Started session-25.scope. Dec 13 15:59:53.932000 audit[7341]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcec45f860 a2=0 a3=7ffcec45f84c items=0 ppid=3027 pid=7341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:54.076281 sshd[7342]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:54.077739 systemd[1]: sshd@26-147.75.203.63:22-139.178.89.65:46728.service: Deactivated successfully. Dec 13 15:59:54.078374 systemd-logind[1640]: Session 25 logged out. Waiting for processes to exit. Dec 13 15:59:54.078416 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 15:59:54.079059 systemd-logind[1640]: Removed session 25. Dec 13 15:59:54.123413 kernel: audit: type=1300 audit(1734105593.932:516): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcec45f860 a2=0 a3=7ffcec45f84c items=0 ppid=3027 pid=7341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:54.123453 kernel: audit: type=1327 audit(1734105593.932:516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:53.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:53.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.63:22-139.178.89.65:46728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:54.269678 kernel: audit: type=1130 audit(1734105593.945:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.63:22-139.178.89.65:46728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:54.269737 kernel: audit: type=1101 audit(1734105593.995:518): pid=7342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:53.995000 audit[7342]: USER_ACCT pid=7342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:53.995000 audit[7342]: CRED_ACQ pid=7342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.452555 kernel: audit: type=1103 audit(1734105593.995:519): pid=7342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.452632 kernel: audit: type=1006 audit(1734105593.995:520): pid=7342 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 15:59:54.511154 kernel: audit: type=1300 audit(1734105593.995:520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5d29e30 a2=3 a3=0 items=0 ppid=1 pid=7342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:53.995000 audit[7342]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5d29e30 a2=3 a3=0 items=0 ppid=1 pid=7342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:54.603973 kernel: audit: type=1327 audit(1734105593.995:520): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:53.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:54.001000 audit[7342]: USER_START pid=7342 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.729885 kernel: audit: type=1105 audit(1734105594.001:521): pid=7342 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.002000 audit[7345]: CRED_ACQ pid=7345 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.076000 audit[7342]: USER_END pid=7342 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.076000 audit[7342]: CRED_DISP pid=7342 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:54.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.63:22-139.178.89.65:46728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:54.366000 audit[7341]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=7341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:59:54.366000 audit[7341]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcec45f860 a2=0 a3=7ffcec45f84c items=0 ppid=3027 pid=7341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:54.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:59:59.083798 systemd[1]: Started sshd@27-147.75.203.63:22-139.178.89.65:38988.service. Dec 13 15:59:59.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.203.63:22-139.178.89.65:38988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:59.111140 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 15:59:59.111232 kernel: audit: type=1130 audit(1734105599.083:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.203.63:22-139.178.89.65:38988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:59:59.225000 audit[7401]: USER_ACCT pid=7401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.225782 sshd[7401]: Accepted publickey for core from 139.178.89.65 port 38988 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:59:59.226983 sshd[7401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:59:59.229420 systemd-logind[1640]: New session 26 of user core. Dec 13 15:59:59.230117 systemd[1]: Started session-26.scope. Dec 13 15:59:59.307628 sshd[7401]: pam_unix(sshd:session): session closed for user core Dec 13 15:59:59.309153 systemd[1]: sshd@27-147.75.203.63:22-139.178.89.65:38988.service: Deactivated successfully. Dec 13 15:59:59.309801 systemd-logind[1640]: Session 26 logged out. Waiting for processes to exit. Dec 13 15:59:59.309832 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 15:59:59.310320 systemd-logind[1640]: Removed session 26. Dec 13 15:59:59.226000 audit[7401]: CRED_ACQ pid=7401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.407637 kernel: audit: type=1101 audit(1734105599.225:528): pid=7401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.407675 kernel: audit: type=1103 audit(1734105599.226:529): pid=7401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.407690 kernel: audit: type=1006 audit(1734105599.226:530): pid=7401 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 15:59:59.466342 kernel: audit: type=1300 audit(1734105599.226:530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6d278fb0 a2=3 a3=0 items=0 ppid=1 pid=7401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:59.226000 audit[7401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6d278fb0 a2=3 a3=0 items=0 ppid=1 pid=7401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:59:59.558647 kernel: audit: type=1327 audit(1734105599.226:530): proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:59.226000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:59:59.589205 kernel: audit: type=1105 audit(1734105599.231:531): pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.231000 audit[7401]: USER_START pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.683814 kernel: audit: type=1103 audit(1734105599.232:532): pid=7404 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.232000 audit[7404]: CRED_ACQ pid=7404 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.772533 kernel: audit: type=1106 audit(1734105599.307:533): pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.307000 audit[7401]: USER_END pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.307000 audit[7401]: CRED_DISP pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.957666 kernel: audit: type=1104 audit(1734105599.307:534): pid=7401 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:59:59.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.203.63:22-139.178.89.65:38988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:04.317099 systemd[1]: Started sshd@28-147.75.203.63:22-139.178.89.65:39000.service. Dec 13 16:00:04.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.63:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:04.344990 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 16:00:04.345047 kernel: audit: type=1130 audit(1734105604.317:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.63:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:04.459000 audit[7442]: USER_ACCT pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.460352 sshd[7442]: Accepted publickey for core from 139.178.89.65 port 39000 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 16:00:04.464006 sshd[7442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:00:04.473838 systemd-logind[1640]: New session 27 of user core. Dec 13 16:00:04.477221 systemd[1]: Started session-27.scope. Dec 13 16:00:04.462000 audit[7442]: CRED_ACQ pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.563154 sshd[7442]: pam_unix(sshd:session): session closed for user core Dec 13 16:00:04.564610 systemd[1]: sshd@28-147.75.203.63:22-139.178.89.65:39000.service: Deactivated successfully. Dec 13 16:00:04.565460 systemd-logind[1640]: Session 27 logged out. Waiting for processes to exit. Dec 13 16:00:04.565527 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 16:00:04.566075 systemd-logind[1640]: Removed session 27. Dec 13 16:00:04.642573 kernel: audit: type=1101 audit(1734105604.459:537): pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.642607 kernel: audit: type=1103 audit(1734105604.462:538): pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.642631 kernel: audit: type=1006 audit(1734105604.462:539): pid=7442 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 16:00:04.700816 kernel: audit: type=1300 audit(1734105604.462:539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0fb5c470 a2=3 a3=0 items=0 ppid=1 pid=7442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:04.462000 audit[7442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0fb5c470 a2=3 a3=0 items=0 ppid=1 pid=7442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:04.792390 kernel: audit: type=1327 audit(1734105604.462:539): proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:04.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:04.822819 kernel: audit: type=1105 audit(1734105604.485:540): pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.485000 audit[7442]: USER_START pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.917488 kernel: audit: type=1103 audit(1734105604.487:541): pid=7445 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.487000 audit[7445]: CRED_ACQ pid=7445 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:05.006526 kernel: audit: type=1106 audit(1734105604.563:542): pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.563000 audit[7442]: USER_END pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:05.101929 kernel: audit: type=1104 audit(1734105604.563:543): pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.563000 audit[7442]: CRED_DISP pid=7442 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:04.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.203.63:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:09.570816 systemd[1]: Started sshd@29-147.75.203.63:22-139.178.89.65:34466.service. Dec 13 16:00:09.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.63:22-139.178.89.65:34466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:09.597638 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 16:00:09.597695 kernel: audit: type=1130 audit(1734105609.570:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.63:22-139.178.89.65:34466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:09.711000 audit[7471]: USER_ACCT pid=7471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.712089 sshd[7471]: Accepted publickey for core from 139.178.89.65 port 34466 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 16:00:09.712854 sshd[7471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:00:09.715200 systemd-logind[1640]: New session 28 of user core. Dec 13 16:00:09.715877 systemd[1]: Started session-28.scope. Dec 13 16:00:09.794565 sshd[7471]: pam_unix(sshd:session): session closed for user core Dec 13 16:00:09.795930 systemd[1]: sshd@29-147.75.203.63:22-139.178.89.65:34466.service: Deactivated successfully. Dec 13 16:00:09.796603 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 16:00:09.796649 systemd-logind[1640]: Session 28 logged out. Waiting for processes to exit. Dec 13 16:00:09.797098 systemd-logind[1640]: Removed session 28. Dec 13 16:00:09.712000 audit[7471]: CRED_ACQ pid=7471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.893919 kernel: audit: type=1101 audit(1734105609.711:546): pid=7471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.893950 kernel: audit: type=1103 audit(1734105609.712:547): pid=7471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.893968 kernel: audit: type=1006 audit(1734105609.712:548): pid=7471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 16:00:09.952432 kernel: audit: type=1300 audit(1734105609.712:548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4f03ba0 a2=3 a3=0 items=0 ppid=1 pid=7471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:09.712000 audit[7471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4f03ba0 a2=3 a3=0 items=0 ppid=1 pid=7471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:10.044390 kernel: audit: type=1327 audit(1734105609.712:548): proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:09.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:10.074850 kernel: audit: type=1105 audit(1734105609.717:549): pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.717000 audit[7471]: USER_START pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:10.169052 kernel: audit: type=1103 audit(1734105609.718:550): pid=7474 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.718000 audit[7474]: CRED_ACQ pid=7474 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:10.258046 kernel: audit: type=1106 audit(1734105609.794:551): pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.794000 audit[7471]: USER_END pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:10.353324 kernel: audit: type=1104 audit(1734105609.794:552): pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.794000 audit[7471]: CRED_DISP pid=7471 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:09.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.203.63:22-139.178.89.65:34466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:14.801225 systemd[1]: Started sshd@30-147.75.203.63:22-139.178.89.65:34474.service. Dec 13 16:00:14.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.63:22-139.178.89.65:34474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:14.828374 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 16:00:14.828419 kernel: audit: type=1130 audit(1734105614.800:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.63:22-139.178.89.65:34474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 16:00:14.943000 audit[7497]: USER_ACCT pid=7497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:14.943779 sshd[7497]: Accepted publickey for core from 139.178.89.65 port 34474 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 16:00:14.944875 sshd[7497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 16:00:14.947457 systemd-logind[1640]: New session 29 of user core. Dec 13 16:00:14.948608 systemd[1]: Started session-29.scope. Dec 13 16:00:15.026633 sshd[7497]: pam_unix(sshd:session): session closed for user core Dec 13 16:00:15.028219 systemd[1]: sshd@30-147.75.203.63:22-139.178.89.65:34474.service: Deactivated successfully. Dec 13 16:00:15.029233 systemd-logind[1640]: Session 29 logged out. Waiting for processes to exit. Dec 13 16:00:15.029377 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 16:00:15.030164 systemd-logind[1640]: Removed session 29. Dec 13 16:00:14.944000 audit[7497]: CRED_ACQ pid=7497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.125493 kernel: audit: type=1101 audit(1734105614.943:555): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.125532 kernel: audit: type=1103 audit(1734105614.944:556): pid=7497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.125552 kernel: audit: type=1006 audit(1734105614.944:557): pid=7497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 16:00:15.183988 kernel: audit: type=1300 audit(1734105614.944:557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50837390 a2=3 a3=0 items=0 ppid=1 pid=7497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:14.944000 audit[7497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50837390 a2=3 a3=0 items=0 ppid=1 pid=7497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 16:00:15.275950 kernel: audit: type=1327 audit(1734105614.944:557): proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:14.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 16:00:15.306387 kernel: audit: type=1105 audit(1734105614.950:558): pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:14.950000 audit[7497]: USER_START pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.400606 kernel: audit: type=1103 audit(1734105614.951:559): pid=7500 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:14.951000 audit[7500]: CRED_ACQ pid=7500 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.489717 kernel: audit: type=1106 audit(1734105615.026:560): pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.026000 audit[7497]: USER_END pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.585016 kernel: audit: type=1104 audit(1734105615.026:561): pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.026000 audit[7497]: CRED_DISP pid=7497 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 16:00:15.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.203.63:22-139.178.89.65:34474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'